Sciweavers

1407 search results - page 109 / 282
» The Use of Overloading in Java Programs
Sort
View
155
Voted
SERP
2010
15 years 15 days ago
Towards Automatic Integration of Or-BAC Security Policies Using Aspects
We propose a formal method to automatically integrate security rules regarding an access control policy (expressed in Or-BAC) in Java programs. Given an untrusted application and a...
Yliès Falcone, Mohamad Jaber
115
Voted
ACMMSP
2004
ACM
92views Hardware» more  ACMMSP 2004»
15 years 8 months ago
Instruction combining for coalescing memory accesses using global code motion
Instruction combining is an optimization to replace a sequence of instructions with a more efficient instruction yielding the same result in a fewer machine cycles. When we use it...
Motohiro Kawahito, Hideaki Komatsu, Toshio Nakatan...
117
Voted
ICS
2000
Tsinghua U.
15 years 6 months ago
Using complete system simulation to characterize SPECjvm98 benchmarks
Complete system simulation to understand the influence of architecture and operating systems on application execution has been identified to be crucial for systems design. While t...
Tao Li, Lizy Kurian John, Narayanan Vijaykrishnan,...
148
Voted
RTAS
2002
IEEE
15 years 7 months ago
Evaluating Real-Time Java Features and Performance for Real-Time Embedded Systems
This paper provides two contributions to the study of programming languages and middleware for real-time and embedded applications. First, we present the empirical results from ap...
Angelo Corsaro, Douglas C. Schmidt
115
Voted
ACE
2004
207views Education» more  ACE 2004»
15 years 4 months ago
Teaching Java First: Experiments with a Pigs-Early Pedagogy
This paper introduces PigWorld, a tool for teaching Java to novice programmers, via the objects-early style. Three design guidelines forobject-early assignments are discussed: (1)...
Raymond Lister