Sciweavers

682 search results - page 59 / 137
» Java Implementation Verification Using Reverse Engineering
Sort
View
SLE
2009
Springer
15 years 2 months ago
Closing the Gap between Modelling and Java
Abstract. Model-Driven Software Development is based on standardised models that are refined, transformed and eventually translated into executable code using code generators. How...
Florian Heidenreich, Jendrik Johannes, Mirko Seife...
110
Voted
CCS
2010
ACM
14 years 10 months ago
An empirical study of privacy-violating information flows in JavaScript web applications
The dynamic nature of JavaScript web applications has given rise to the possibility of privacy violating information flows. We present an empirical study of the prevalence of such...
Dongseok Jang, Ranjit Jhala, Sorin Lerner, Hovav S...
CODES
2002
IEEE
15 years 2 months ago
Energy savings through compression in embedded Java environments
Limited energy and memory resources are important constraints in the design of an embedded system. Compression is an useful and widely employed mechanism to reduce the memory requ...
Guangyu Chen, Mahmut T. Kandemir, Narayanan Vijayk...
WCRE
2008
IEEE
15 years 4 months ago
An Empirical Study of Function Clones in Open Source Software
The new hybrid clone detection tool NICAD combines the strengths and overcomes the limitations of both textbased and AST-based clone detection techniques to yield highly accurate ...
Chanchal Kumar Roy, James R. Cordy
WCRE
2007
IEEE
15 years 4 months ago
Documenting Typical Crosscutting Concerns
Our analysis of crosscutting concerns in real-life software systems (totaling over 500,000 LOC) and in reports from literature indicated a number of properties that allow for thei...
Marius Marin, Leon Moonen, Arie van Deursen