Sciweavers

14824 search results - page 2593 / 2965
» Security - Introduction
Sort
View
130
Voted
OOPSLA
2005
Springer
15 years 9 months ago
Using refactorings to automatically update component-based applications
Frameworks and libraries change their APIs during evolution. Migrating an application to the new API is tedious and disrupts the development process. Although some tools and techn...
Danny Dig
109
Voted
OOPSLA
2005
Springer
15 years 9 months ago
Subtext: uncovering the simplicity of programming
Representing programs as text strings makes programming harder then it has to be. The source text of a program is far removed from its behavior. Bridging this conceptual gulf is w...
Jonathan Edwards
107
Voted
OOPSLA
2005
Springer
15 years 9 months ago
Fine-grained interoperability through mirrors and contracts
As a value flows across the boundary between interoperating languages, it must be checked and converted to fit the types and representations of the target language. For simple f...
Kathryn E. Gray, Robert Bruce Findler, Matthew Fla...
132
Voted
OOPSLA
2005
Springer
15 years 9 months ago
Pattern transformation for two-dimensional separation of concerns
Design patterns are applied in software development to decouple individual concerns, so that a change in a design decision is isolated to one location of the code base. However, m...
Xiaoqing Wu
126
Voted
OOPSLA
2005
Springer
15 years 9 months ago
Removing duplication from java.io: a case study using traits
Code duplication is a serious problem with no easy solution, even in industrial-strength code. Single inheritance cannot provide for effective code reuse in all situations, and s...
Emerson R. Murphy-Hill, Philip J. Quitslund, Andre...
« Prev « First page 2593 / 2965 Last » Next »