Suchergebnisse - Java Container Class Methods
-
1
Using Semeru Cloud Compiler to Enhance Cloud-Native Java Application Performance
Veröffentlicht: IEEE 11.11.2024Veröffentlicht in 2024 34th International Conference on Collaborative Advances in Software and COmputiNg (CASCON) (11.11.2024)“… Java-based applications rely on just-in-time (JIT) compilation to convert bytecode into machine code at run-time to improve throughput …”
Volltext
Tagungsbericht -
2
Reverse-engineering 1-n associations from Java bytecode using alias analysis
ISSN: 0950-5849, 1873-6025Veröffentlicht: Amsterdam Elsevier B.V 01.02.2007Veröffentlicht in Information and software technology (01.02.2007)“… To implement 1-n associations, container classes, such as Vector in Java, are frequently used as programming language constructs …”
Volltext
Journal Article -
3
Unikernels vs Containers: An In-Depth Benchmarking Study in the Context of Microservice Applications
Veröffentlicht: IEEE 01.11.2018Veröffentlicht in 2018 IEEE 8th International Symposium on Cloud and Service Computing (SC2) (01.11.2018)“… Unikernels are a relatively recent way to create and quickly deploy extremely small virtual machines that do not require as much functional and operational software overhead as containers or virtual …”
Volltext
Tagungsbericht -
4
Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM
ISSN: 1615-5262, 1615-5270Veröffentlicht: Berlin/Heidelberg Springer Berlin Heidelberg 01.02.2019Veröffentlicht in International journal of information security (01.02.2019)“… This paper presents the process we used to gain access to the assets in the particular case of Java Card secure element …”
Volltext
Journal Article -
5
Containers on the Parallelization of General-Purpose Java Programs
ISSN: 0885-7458, 1573-7640Veröffentlicht: New York Springer Nature B.V 01.12.2000Veröffentlicht in International journal of parallel programming (01.12.2000)“… Focus is on general purpose Java programs with extensive use of Java container classes …”
Volltext
Journal Article -
6
Refactoring the aspectizable interfaces: an empirical assessment
ISSN: 0098-5589, 1939-3520Veröffentlicht: New York IEEE 01.10.2005Veröffentlicht in IEEE transactions on software engineering (01.10.2005)“… We call such interfaces aspectizable. All the aspectizable interfaces identified within a large number of classes from the Java Standard Library and from three Java applications have been automatically migrated to aspects …”
Volltext
Journal Article -
7
Using a multiple-delivery-mode training approach to develop local capacity and infrastructure for advanced bioinformatics in Africa
ISSN: 1553-734X, 1553-7358, 1553-7358Veröffentlicht: United States Public Library of Science 01.02.2021Veröffentlicht in PLoS computational biology (01.02.2021)“… along with a lack of local computational infrastructure and expertise. To address this, H3ABioNet developed a 16S rRNA Microbiome Intermediate Bioinformatics Training course, extending its remote classroom model …”
Volltext
Journal Article -
8
Coverage rewarded: Test input generation via adaptation-based programming
ISBN: 1457716380, 9781457716386ISSN: 1938-4300Veröffentlicht: Washington, DC, USA IEEE Computer Society 06.11.2011Veröffentlicht in 2011 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011) (06.11.2011)“… container classes, including random testing and shape-based abstraction …”
Volltext
Tagungsbericht -
9
The research and design of object container technique
ISBN: 9781467301985, 1467301981Veröffentlicht: IEEE 01.05.2012Veröffentlicht in 2012 International Conference on Systems and Informatics (01.05.2012)“… s. To solve the problem, this paper put forward data class object container method. This object container encapsulates direct access to the database in a base class and provides generic interface services …”
Volltext
Tagungsbericht -
10
Synthesizing Object Transformation for Dynamic Software Updating
Veröffentlicht: IEEE 01.05.2017Veröffentlicht in 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C) (01.05.2017)“… This paper presents AOTES, an approach to automating object transformations for dynamic updating of Java programs …”
Volltext
Tagungsbericht -
11
Leveraging Method Call Anomalies to Improve the Effectiveness of Spectrum-Based Fault Localization Techniques for Object-Oriented Programs
ISBN: 146732857X, 9781467328579ISSN: 1550-6002Veröffentlicht: IEEE 01.08.2012Veröffentlicht in 2012 12th International Conference on Quality Software (01.08.2012)“… First, we compute the suspiciousness for each class based on the difference in its method call sequences between passed and failed runs …”
Volltext
Tagungsbericht -
12
Refreshing patterns
ISSN: 0740-7459, 1937-4194Veröffentlicht: Los Alamitos, CA IEEE 01.05.2006Veröffentlicht in IEEE software (01.05.2006)“… So, the authors relied on abstract class definitions which opened the door for declaring default method implementations and common attributes …”
Volltext
Journal Article -
13
Documentation‐based functional constraint generation for library methods
ISSN: 0960-0833, 1099-1689Veröffentlicht: Chichester Wiley Subscription Services, Inc 01.12.2021Veröffentlicht in Software testing, verification & reliability (01.12.2021)“… To effectively analyse programmes built on top of software libraries, it is essential to have specifications for the library methods that can be easily processed by analysis tools …”
Volltext
Journal Article -
14
State generation and automated class testing
ISSN: 0960-0833, 1099-1689Veröffentlicht: Chichester, UK John Wiley & Sons, Ltd 01.09.2000Veröffentlicht in Software testing, verification & reliability (01.09.2000)“… The maturity of object‐oriented methods has led to the wide availability of container classes …”
Volltext
Journal Article -
15
WebProtégé: a collaborative Web-based platform for editing biomedical ontologies
ISSN: 1367-4803, 1367-4811, 1367-4811Veröffentlicht: England Oxford University Press 15.08.2014Veröffentlicht in Bioinformatics (Oxford, England) (15.08.2014)“… also features a simple user interface, which is geared towards editing the kinds of class descriptions and annotations that are prevalent throughout biomedical ontologies …”
Volltext
Journal Article -
16
Applying a Pairwise Coverage Criterion to Scenario-Based Testing
Veröffentlicht: IEEE 01.04.2016Veröffentlicht in 2016 IEEE Ninth International Conference on Software Testing, Verification and Validation Workshops (ICSTW) (01.04.2016)“… The originality of the approach lies in the fact that the pairwise criterion is applied to the instantiated method calls …”
Volltext
Tagungsbericht -
17
Package Fingerprints: A visual summary of package interface usage
ISSN: 0950-5849, 1873-6025Veröffentlicht: Amsterdam Elsevier B.V 01.12.2010Veröffentlicht in Information and software technology (01.12.2010)“… (class container, code ownership, etc.). Several approaches have been proposed, among which the use of cohesion and coupling metrics …”
Volltext
Journal Article -
18
Automated test-case generation by cloning
ISBN: 1467318213, 9781467318211Veröffentlicht: IEEE 01.06.2012Veröffentlicht in 2012 7th International Workshop on Automation of Software Test (AST) (01.06.2012)“… % of all test cases are clones; the maximum found was 42 %. The clones are not identical with their originals - identifiers of classes, methods, attributes and sometimes even order of statements and assertions differ …”
Volltext
Tagungsbericht -
19
Very high level programming with collection components
ISBN: 076950275X, 9780769502755Veröffentlicht: IEEE 1999Veröffentlicht in Object-Oriented Languages: Proceedings: 29th Conference on Technology of Object-Oriented Languages and Systems, 1999, Nancy, France (1999)“… are regarded as first class citizens and in which different implementations for a collection can be exchanged without affecting the correctness of a program and with minimal change to the source code …”
Volltext
Tagungsbericht -
20
EAM: Expansive Access Modifiers in OOP
ISBN: 9781424416912, 1424416914Veröffentlicht: IEEE 01.05.2008Veröffentlicht in 2008 International Conference on Computer and Communication Engineering (01.05.2008)“… Elements in OOP are classified under maximum five access modifiers which are: public, private, protected and etc. Although, they are useful to restrict the …”
Volltext
Tagungsbericht

