Sciweavers

1135 search results - page 178 / 227
» On Performance of Delegation in Java
Sort
View
GPCE
2009
Springer
14 years 11 months ago
Generating safe template languages
Template languages are widely used within generative programming, because they provide intuitive means to generate software artefacts expressed in a specific object language. Howe...
Florian Heidenreich, Jendrik Johannes, Mirko Seife...
CSMR
2011
IEEE
14 years 5 months ago
Sub-graph Mining: Identifying Micro-architectures in Evolving Object-Oriented Software
Abstract—Developers introduce novel and undocumented micro-architectures when performing evolution tasks on object-oriented applications. We are interested in understanding wheth...
Ahmed Belderrar, Segla Kpodjedo, Yann-Gaël Gu...
ICST
2011
IEEE
14 years 5 months ago
Tailored Shielding and Bypass Testing of Web Applications
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...
CGO
2010
IEEE
15 years 8 months ago
Automated just-in-time compiler tuning
Managed runtime systems, such as a Java virtual machine (JVM), are complex pieces of software with many interacting components. The Just-In-Time (JIT) compiler is at the core of t...
Kenneth Hoste, Andy Georges, Lieven Eeckhout
IWMM
2011
Springer
206views Hardware» more  IWMM 2011»
14 years 4 months ago
A comprehensive evaluation of object scanning techniques
At the heart of all garbage collectors lies the process of identifying and processing reference fields within an object. Despite its key role, and evidence of many different impl...
Robin Garner, Stephen M. Blackburn, Daniel Frampto...