Sciweavers

1407 search results - page 183 / 282
» The Use of Overloading in Java Programs
Sort
View
83
Voted
ANNALS
2006
63views more  ANNALS 2006»
15 years 2 months ago
The Virtual Life of ENIAC: Simulating the Operation of the First Electronic Computer
This paper describes an interactive simulation of the Electronical Numerical Integrator and Computer (ENIAC). With the simulator, the user can wire up complex configurations of th...
Till Zoppke, Raúl Rojas
104
Voted
COMBINATORICS
2002
102views more  COMBINATORICS 2002»
15 years 2 months ago
Computation in Coxeter Groups-I. Multiplication
An efficient and purely combinatorial algorithm for calculating products in arbitrary Coxeter groups is presented, which combines ideas of Fokko du Cloux and myself. Proofs are lar...
Bill Casselman
111
Voted
SIGCSE
2002
ACM
163views Education» more  SIGCSE 2002»
15 years 2 months ago
Design guidelines for the lab component of objects-first CS1
We adopt the view that CS1 labs are not programming assignments, and that they should not be used for grading students or assessing their level of understanding. Instead, we think...
Hamzeh Roumani
89
Voted
SAC
2008
ACM
15 years 2 months ago
Slack time evaluation with RTSJ
We address in this paper the problem of jointly scheduling hard periodic tasks and soft aperiodic events using the Real-Time Specification for Java (RTSJ). We present the programm...
Damien Masson, Serge Midonnet
ICFP
2003
ACM
16 years 2 months ago
A static type system for JVM access control
This paper presents a static type system for JAVA Virtual Machine (JVM) code that enforces an access control mechanism similar to the one found, for example, in a JAVA implementat...
Tomoyuki Higuchi, Atsushi Ohori