Sciweavers

325 search results - page 36 / 65
» Rewriting Strategies in Java
Sort
View
ESORICS
2000
Springer
15 years 1 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
CSMR
2008
IEEE
15 years 4 months ago
JDeodorant: Identification and Removal of Type-Checking Bad Smells
In this demonstration, we present an Eclipse plug-in that automatically identifies Type-Checking bad smells in Java source code, and resolves them by applying the “Replace Condi...
Nikolaos Tsantalis, Theodoros Chaikalis, Alexander...
LCPC
2005
Springer
15 years 3 months ago
Software Thread Level Speculation for the Java Language and Virtual Machine Environment
Thread level speculation (TLS) has shown great promise as a strategy for fine to medium grain automatic parallelisation, and in a hardware context techniques to ensure correct TLS...
Christopher J. F. Pickett, Clark Verbrugge
75
Voted
TACAS
2010
Springer
160views Algorithms» more  TACAS 2010»
14 years 7 months ago
Efficient Detection of Errors in Java Components Using Random Environment and Restarts
Software model checkers are being used mostly to discover specific types of errors in the code, since exhaustive verification of complex programs is not possible due to state explo...
Pavel Parizek, Tomás Kalibera
UML
2005
Springer
15 years 3 months ago
Simplifying Autonomic Enterprise Java Bean Applications Via Model-Driven Development: A Case Study
Autonomic computer systems aim to reduce the configuration, operational, and maintenance costs of distributed applications by enabling them to self-manage, self-heal, self-optimiz...
Jules White, Douglas C. Schmidt, Aniruddha S. Gokh...