Sciweavers

14824 search results - page 2873 / 2965
» Security - Introduction
Sort
View
OOPSLA
2004
Springer
15 years 4 months ago
Chianti: a tool for change impact analysis of java programs
This paper reports on the design and implementation of Chianti, a change impact analysis tool for Java that is implemented in the context of the Eclipse environment. Chianti analy...
Xiaoxia Ren, Fenil Shah, Frank Tip, Barbara G. Ryd...
84
Voted
OOPSLA
2004
Springer
15 years 4 months ago
MC2: high-performance garbage collection for memory-constrained environments
Java is becoming an important platform for memory-constrained consumer devices such as PDAs and cellular phones, because it provides safety and portability. Since Java uses garbag...
Narendran Sachindran, J. Eliot B. Moss, Emery D. B...
OOPSLA
2004
Springer
15 years 4 months ago
Finding and preventing run-time error handling mistakes
It is difficult to write programs that behave correctly in the presence of run-time errors. Existing programming language features often provide poor support for executing clean-u...
Westley Weimer, George C. Necula
99
Voted
OOPSLA
2004
Springer
15 years 4 months ago
Resolving feature convolution in middleware systems
Middleware provides simplicity and uniformity for the development of distributed applications. However, the modularity of the architecture of middleware is starting to disintegrat...
Charles Zhang, Hans-Arno Jacobsen
PSD
2004
Springer
108views Database» more  PSD 2004»
15 years 4 months ago
Developing Adoptable Disclosure Protection Techniques: Lessons Learned from a U.S. Experience
The development of new disclosure protection techniques is useful only insofar as those techniques are adopted by statistical agencies. In order for technical experts in disclosure...
Nicholas H. Greenia
« Prev « First page 2873 / 2965 Last » Next »