Sciweavers

2056 search results - page 272 / 412
» Mobile objects in Java
Sort
View
USENIX
2008
15 years 4 months ago
LeakSurvivor: Towards Safely Tolerating Memory Leaks for Garbage-Collected Languages
Continuous memory leaks severely hurt program performance and software availability for garbage-collected programs. This paper presents a safe method, called LeakSurvivor, to tole...
Yan Tang, Qi Gao, Feng Qin
121
Voted
IADIS
2003
15 years 4 months ago
Paradigm Shifts and Business Processes: A Case Study
The vast majority of IT systems are implemented using a traditional procedural paradigm approach using a suitable procedural language such as COBOL. However, with recent developme...
Paul Maclear, Paul Darbyshire
139
Voted
CSFW
2009
IEEE
15 years 9 months ago
Securing Timeout Instructions in Web Applications
Timeout mechanisms are a useful feature for web applications. However, these mechanisms need to be used with care because, if used as-is, they are vulnerable to timing attacks. Th...
Alejandro Russo, Andrei Sabelfeld
101
Voted
KBSE
2008
IEEE
15 years 9 months ago
A Generic Approach for Class Model Normalization
Designing and maintaining a huge class model is a very complex task. When an object oriented software or model becomes bigger and bigger, duplicated elements start to appear, decr...
Jean-Rémy Falleri, Marianne Huchard, Cl&eac...
121
Voted
ICOST
2007
Springer
15 years 8 months ago
Characterizing Safety of Integrated Services in Home Network System
This paper formalizes three kinds of safety to be satisfied by networked appliances and services in the emerging home network system (HNS). The local safety is defined by safety ...
Ben Yan, Masahide Nakamura, Lydie du Bousquet, Ken...