Sciweavers

1407 search results - page 193 / 282
» The Use of Overloading in Java Programs
Sort
View
111
Voted
QSIC
2007
IEEE
15 years 8 months ago
Coping with API Evolution for Running, Mission-Critical Applications Using Virtual Execution Environment
Recent research showed that the majority of compatibility-breaking changes in a component-based, object-oriented software system are refactorings [5]. The software updating proces...
Bashar Gharaibeh, Tien N. Nguyen, J. Morris Chang
PLDI
2005
ACM
15 years 8 months ago
TraceBack: first fault diagnosis by reconstruction of distributed control flow
Faults that occur in production systems are the most important faults to fix, but most production systems lack the debugging facilities present in development environments. TraceB...
Andrew Ayers, Richard Schooler, Chris Metcalf, Ana...
DRM
2003
Springer
15 years 7 months ago
Obfuscation of design intent in object-oriented applications
Protection of digital data from unauthorized access is of paramount importance. In the past several years, much research has concentrated on protecting data from the standpoint of...
Mikhail Sosonkin, Gleb Naumovich, Nasir D. Memon
120
Voted
SAC
2010
ACM
15 years 9 months ago
Performance and extension of user space file systems
Several efforts have been made over the years for developing file systems in user space. Many of these efforts have failed to make a significant impact as measured by their us...
Aditya Rajgarhia, Ashish Gehani
135
Voted
POPL
2012
ACM
13 years 10 months ago
Multiple facets for dynamic information flow
JavaScript has become a central technology of the web, but it is also the source of many security problems, including cross-site scripting attacks and malicious advertising code. ...
Thomas H. Austin, Cormac Flanagan