Sciweavers

5119 search results - page 975 / 1024
» Security Privacy
Sort
View
OOPSLA
2005
Springer
15 years 3 months ago
Pattern transformation for two-dimensional separation of concerns
Design patterns are applied in software development to decouple individual concerns, so that a change in a design decision is isolated to one location of the code base. However, m...
Xiaoqing Wu
OOPSLA
2005
Springer
15 years 3 months ago
Removing duplication from java.io: a case study using traits
Code duplication is a serious problem with no easy solution, even in industrial-strength code. Single inheritance cannot provide for effective code reuse in all situations, and s...
Emerson R. Murphy-Hill, Philip J. Quitslund, Andre...
OOPSLA
2005
Springer
15 years 3 months ago
A delta-driven execution model for semantic computing
We describe (and demonstrate) the execution model of a computing platform where computation is both incremental and data-driven. We call such an approach delta-driven. The platfor...
Roly Perera, Jeff Foster, György Koch
OOPSLA
2005
Springer
15 years 3 months ago
Using dependency models to manage complex software architecture
An approach to managing the architecture of large software systems is presented. Dependencies are extracted from the code by a conventional static analysis, and shown in a tabular...
Neeraj Sangal, Ev Jordan, Vineet Sinha, Daniel Jac...
OOPSLA
2005
Springer
15 years 3 months ago
Fortune teller: improving garbage collection performance in server environment using live objects prediction
Currently, the most adopted criterion to invoke garbage collection is heap space exhaustion. In other words, garbage collection is invoked when the heap space (either the entire s...
Feng Xian, Witawas Srisa-an, Hong Jiang