Sciweavers

5119 search results - page 1014 / 1024
» Security Privacy
Sort
View
OOPSLA
2004
Springer
15 years 3 months ago
Finding your cronies: static analysis for dynamic object colocation
This paper introduces dynamic object colocation, an optimization to reduce copying costs in generational and other incremental garbage collectors by allocating connected objects t...
Samuel Z. Guyer, Kathryn S. McKinley
OOPSLA
2004
Springer
15 years 3 months ago
The garbage collection advantage: improving program locality
As improvements in processor speed continue to outpace improvements in cache and memory speed, poor locality increasingly degrades performance. Because copying garbage collectors ...
Xianglong Huang, Stephen M. Blackburn, Kathryn S. ...
OOPSLA
2004
Springer
15 years 3 months ago
Modeling event driven applications with a specification language (MEDASL)
Radio Frequency Identification (RFID) technology provides the means to track any object, any time, anywhere with Electronic Product Codes (EPC). A major consequence of this techno...
Murali Kaundinya, Ali Syed
OOPSLA
2004
Springer
15 years 3 months ago
AJEER: an aspectJ-enabled eclipse runtime
There are a number of technologies designed to improve modularity in software systems. The technique presented here combines two of them seamlessly to exploit their respective ben...
Martin Lippert
70
Voted
OOPSLA
2004
Springer
15 years 3 months ago
Practical predicate dispatch
Predicate dispatch is an object-oriented (OO) language mechanism for determining the method implementation to be invoked upon a message send. With predicate dispatch, each method ...
Todd D. Millstein
« Prev « First page 1014 / 1024 Last » Next »