Sciweavers

1407 search results - page 72 / 282
» The Use of Overloading in Java Programs
Sort
View
194
Voted
ECOOP
2009
Springer
16 years 3 months ago
Loci: Simple Thread-Locality for Java
This paper presents a simple type system for thread-local data in Java. Classes and types are annotated to express thread-locality and unintended leaks are detected at compile-time...
Tobias Wrigstad, Filip Pizlo, Fadi Meawad, Lei Zha...
120
Voted
CADE
2007
Springer
16 years 2 months ago
Inferring Invariants by Symbolic Execution
In this paper we propose a method for inferring invariants for loops in Java programs. An example of a simple while loop is used throughout the paper to explain our approach. The m...
Benjamin Weiß, Peter H. Schmitt
113
Voted
HICSS
2003
IEEE
110views Biometrics» more  HICSS 2003»
15 years 7 months ago
Modeling Web Applications Using Java and XML Related Technologies
The purpose of this paper is to propose visual models for a web application using Java and XML related technologies. We consider a web application that uses 3tier architecture and...
Sam Chung, Yun Sik Lee
SACMAT
2010
ACM
15 years 7 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
135
Voted
BIRTHDAY
2010
Springer
15 years 13 days ago
Termination Graphs for Java Bytecode
To prove termination of Java Bytecode (JBC) automatically, we transform JBC to finite termination graphs which represent all possible runs of the program. Afterwards, the graph can...
Marc Brockschmidt, Carsten Otto, Christian von Ess...