Sciweavers

769 search results - page 74 / 154
» The Real-Time Specification for Java
Sort
View
ACSC
2009
IEEE
15 years 6 months ago
Improving the Transparency of Proxy Injection in Java
Due to their flexibility, proxies have been used for various purposes in standalone and distributed applications. More specifically, object-level proxies support fine grained capa...
Hendrik Gani, Caspar Ryan
HICSS
2005
IEEE
121views Biometrics» more  HICSS 2005»
15 years 5 months ago
Java Architectures for Mobilised Enterprise Systems
The coming generation of mobile phones will enable objects from enterprise systems to be distributed across a range of devices of different scales. This object mobility will provi...
David Parsons
COOTS
1998
15 years 1 months ago
Java Transactions for the Internet
The Web frequently suffers from failures which affect the performance and consistency of applications run over it. An important fault-tolerance technique is the use of atomic tran...
Mark C. Little, Santosh K. Shrivastava
USS
2008
15 years 2 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam
COMPSAC
2007
IEEE
15 years 6 months ago
A Combined Concept Location Method for Java Programs
Concept location is one of the fundamental activities during software maintenance which locates the parts of the source code where a specific concept is implemented. The methods f...
Dapeng Liu, Shaochun Xu