Sciweavers

1407 search results - page 173 / 282
» The Use of Overloading in Java Programs
Sort
View
GRID
2003
Springer
15 years 8 months ago
Autonomic Service Adaptation in ICENI using Ontological Annotation
With the advent of web services standards and a serviceoriented Grid architecture, it is foreseeable that competing as well as complimenting computational services will proliferat...
Jeffrey Hau, William Lee, Steven Newhouse
SENSYS
2009
ACM
15 years 10 months ago
Darjeeling, a feature-rich VM for the resource poor
The programming and retasking of sensor nodes could benefit greatly from the use of a virtual machine (VM) since byte code is compact, can be loaded on demand, and interpreted on...
Niels Brouwers, Koen Langendoen, Peter Corke
COMPSAC
2004
IEEE
15 years 7 months ago
Web Application Bypass Testing
Input validation refers to checking user inputs to a program to ensure that they conform to expectations of the program. Input validation is used to check the format of numbers and...
Jeff Offutt, Ye Wu, Xiaochen Du, Hong Huang
121
Voted
MEMOCODE
2010
IEEE
15 years 1 months ago
Modular verification of synchronization with reentrant locks
We present a modular approach for verification of synchronization behavior in concurrent programs that use reentrant locks. Our approach decouples the verification of the lock impl...
Tevfik Bultan, Fang Yu, Aysu Betin-Can
159
Voted
CADE
2009
Springer
16 years 3 months ago
Integrated Reasoning and Proof Choice Point Selection in the Jahob System - Mechanisms for Program Survival
In recent years researchers have developed a wide range of powerful automated reasoning systems. We have leveraged these systems to build Jahob, a program specification, analysis, ...
Martin C. Rinard