Sciweavers

1407 search results - page 244 / 282
» The Use of Overloading in Java Programs
Sort
View
ACMMSP
2006
ACM
226views Hardware» more  ACMMSP 2006»
15 years 6 months ago
Smarter garbage collection with simplifiers
We introduce a method for providing lightweight daemons, called simplifiers, that attach themselves to program data. If a data item has a simplifier, the simplifier may be run aut...
Melissa E. O'Neill, F. Warren Burton
VEE
2010
ACM
229views Virtualization» more  VEE 2010»
15 years 9 months ago
VMKit: a substrate for managed runtime environments
Managed Runtime Environments (MREs), such as the JVM and the CLI, form an attractive environment for program execution, by providing portability and safety, via the use of a bytec...
Nicolas Geoffray, Gaël Thomas, Julia L. Lawal...
105
Voted
KBSE
2009
IEEE
15 years 9 months ago
Improving API Usage through Automatic Detection of Redundant Code
—Software projects often rely on third-party libraries made accessible through Application Programming Interfaces (APIs). We have observed many cases where APIs are used in ways ...
David Kawrykow, Martin P. Robillard
CSMR
2007
IEEE
15 years 8 months ago
Example-Driven Reconstruction of Software Models
As software systems evolve, they become more complex and harder to understand and maintain. Certain reverse engineering techniques attempt to reconstruct software models from sour...
Oscar Nierstrasz, Markus Kobel, Tudor Gîrba,...
MSWIM
2005
ACM
15 years 7 months ago
YAES: a modular simulator for mobile networks
Developing network protocols for mobile wireless systems is a complex task, and most of the existing simulator frameworks are not well suited for experimental development. The YAE...
Ladislau Bölöni, Damla Turgut