Sciweavers

5343 search results - page 251 / 1069
» Keyword programming in java
Sort
View
VEE
2012
ACM
222views Virtualization» more  VEE 2012»
13 years 10 months ago
Unpicking the knot: teasing apart VM/application interdependencies
Flexible and efficient runtime design requires an understanding of the dependencies among the components internal to the runtime and those between the application and the runtime...
Yi Lin, Stephen M. Blackburn, Daniel Frampton
WWW
2002
ACM
16 years 3 months ago
A graphical user interface toolkit approach to thin-client computing
Network and server-centric computing paradigms are quickly returning to being the dominant methods by which we use computers. Web applications are so prevalent that the role of a ...
Simon Lok, Steven Feiner, William M. Chiong, Yoav ...
KCAP
2003
ACM
15 years 8 months ago
Learning programs from traces using version space algebra
While existing learning techniques can be viewed as inducing programs from examples, most research has focused on rather narrow classes of programs, e.g., decision trees or logic ...
Tessa A. Lau, Pedro Domingos, Daniel S. Weld
ICECCS
2002
IEEE
84views Hardware» more  ICECCS 2002»
15 years 8 months ago
An Empirical Comparison of Modularity of Procedural and Object-oriented Software
A commonly held belief is that applications written ina object-oriented languages are more modular than those written in procedural languages. This paper presents results from an ...
Lisa K. Ferrett, Jeff Offutt
ECOOP
2005
Springer
15 years 8 months ago
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
In Java 2 and Microsoft .NET Common Language Runtime (CLR), trusted code has often been programmed to perform accessrestricted operations not explicitly requested by its untrusted ...
Marco Pistoia, Robert J. Flynn, Larry Koved, Vugra...