Sciweavers

1407 search results - page 67 / 282
» The Use of Overloading in Java Programs
Sort
View
TGC
2010
Springer
15 years 6 days ago
Symbolic and Analytic Techniques for Resource Analysis of Java Bytecode
Recent work in resource analysis has translated the idea of amortised resource analysis to imperative languages using a program logic that allows mixing of assertions about heap sh...
David Aspinall, Robert Atkey, Kenneth MacKenzie, D...
REFLECTION
2001
Springer
15 years 6 months ago
A Simple Security-Aware MOP for Java
This article investigates the security problems raised by the use of proxy-based runtime meta-object protocols (MOPs) for Java and provides an approach for making meta-level code t...
Denis Caromel, Fabrice Huet, Julien Vayssiè...
108
Voted
FIDJI
2004
Springer
15 years 6 months ago
Modeling and Analysis of Exception Handling by Using UML Statecharts
Our paper aims at proposing a framework that allows programmers to exploit the benefits of exception handling throughout the entire development Java programs by modeling exception ...
Gergely Pintér, István Majzik
KBSE
2007
IEEE
15 years 8 months ago
A dynamic birthmark for java
Code theft is a threat for companies that consider code as a core asset. A birthmark can help them to prove code theft by identifying intrinsic properties of a program. Two progra...
David Schuler, Valentin Dallmeier, Christian Lindi...
132
Voted
ECOOP
2010
Springer
15 years 7 months ago
Correct Refactoring of Concurrent Java Code
Automated refactorings as implemented in modern IDEs for Java usually make no special provisions for concurrent code. Thus, refactored programs may exhibit unexpected new concurren...
Max Schäfer, Julian Dolby, Manu Sridharan, Em...