Search Results - Java Container Class Methods
-
1
Using Semeru Cloud Compiler to Enhance Cloud-Native Java Application Performance
Published: IEEE 11.11.2024Published in 2024 34th International Conference on Collaborative Advances in Software and COmputiNg (CASCON) (11.11.2024)“…Java-based applications rely on just-in-time (JIT) compilation to convert bytecode into machine code at run-time to improve throughput…”
Get full text
Conference Proceeding -
2
Reverse-engineering 1-n associations from Java bytecode using alias analysis
ISSN: 0950-5849, 1873-6025Published: Amsterdam Elsevier B.V 01.02.2007Published in Information and software technology (01.02.2007)“… To implement 1-n associations, container classes, such as Vector in Java, are frequently used as programming language constructs…”
Get full text
Journal Article -
3
Unikernels vs Containers: An In-Depth Benchmarking Study in the Context of Microservice Applications
Published: IEEE 01.11.2018Published in 2018 IEEE 8th International Symposium on Cloud and Service Computing (SC2) (01.11.2018)“…Unikernels are a relatively recent way to create and quickly deploy extremely small virtual machines that do not require as much functional and operational software overhead as containers or virtual…”
Get full text
Conference Proceeding -
4
Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM
ISSN: 1615-5262, 1615-5270Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.02.2019Published in International journal of information security (01.02.2019)“… This paper presents the process we used to gain access to the assets in the particular case of Java Card secure element…”
Get full text
Journal Article -
5
Containers on the Parallelization of General-Purpose Java Programs
ISSN: 0885-7458, 1573-7640Published: New York Springer Nature B.V 01.12.2000Published in International journal of parallel programming (01.12.2000)“… Focus is on general purpose Java programs with extensive use of Java container classes…”
Get full text
Journal Article -
6
Refactoring the aspectizable interfaces: an empirical assessment
ISSN: 0098-5589, 1939-3520Published: New York IEEE 01.10.2005Published in IEEE transactions on software engineering (01.10.2005)“… We call such interfaces aspectizable. All the aspectizable interfaces identified within a large number of classes from the Java Standard Library and from three Java applications have been automatically migrated to aspects…”
Get full text
Journal Article -
7
Using a multiple-delivery-mode training approach to develop local capacity and infrastructure for advanced bioinformatics in Africa
ISSN: 1553-734X, 1553-7358, 1553-7358Published: United States Public Library of Science 01.02.2021Published in PLoS computational biology (01.02.2021)“… along with a lack of local computational infrastructure and expertise. To address this, H3ABioNet developed a 16S rRNA Microbiome Intermediate Bioinformatics Training course, extending its remote classroom model…”
Get full text
Journal Article -
8
Coverage rewarded: Test input generation via adaptation-based programming
ISBN: 1457716380, 9781457716386ISSN: 1938-4300Published: Washington, DC, USA IEEE Computer Society 06.11.2011Published in 2011 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011) (06.11.2011)“… container classes, including random testing and shape-based abstraction…”
Get full text
Conference Proceeding -
9
The research and design of object container technique
ISBN: 9781467301985, 1467301981Published: IEEE 01.05.2012Published in 2012 International Conference on Systems and Informatics (01.05.2012)“…s. To solve the problem, this paper put forward data class object container method. This object container encapsulates direct access to the database in a base class and provides generic interface services…”
Get full text
Conference Proceeding -
10
Synthesizing Object Transformation for Dynamic Software Updating
Published: IEEE 01.05.2017Published in 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C) (01.05.2017)“… This paper presents AOTES, an approach to automating object transformations for dynamic updating of Java programs…”
Get full text
Conference Proceeding -
11
Leveraging Method Call Anomalies to Improve the Effectiveness of Spectrum-Based Fault Localization Techniques for Object-Oriented Programs
ISBN: 146732857X, 9781467328579ISSN: 1550-6002Published: IEEE 01.08.2012Published in 2012 12th International Conference on Quality Software (01.08.2012)“… First, we compute the suspiciousness for each class based on the difference in its method call sequences between passed and failed runs…”
Get full text
Conference Proceeding -
12
Refreshing patterns
ISSN: 0740-7459, 1937-4194Published: Los Alamitos, CA IEEE 01.05.2006Published in IEEE software (01.05.2006)“… So, the authors relied on abstract class definitions which opened the door for declaring default method implementations and common attributes…”
Get full text
Journal Article -
13
Documentation‐based functional constraint generation for library methods
ISSN: 0960-0833, 1099-1689Published: Chichester Wiley Subscription Services, Inc 01.12.2021Published in Software testing, verification & reliability (01.12.2021)“… To effectively analyse programmes built on top of software libraries, it is essential to have specifications for the library methods that can be easily processed by analysis tools…”
Get full text
Journal Article -
14
State generation and automated class testing
ISSN: 0960-0833, 1099-1689Published: Chichester, UK John Wiley & Sons, Ltd 01.09.2000Published in Software testing, verification & reliability (01.09.2000)“…The maturity of object‐oriented methods has led to the wide availability of container classes…”
Get full text
Journal Article -
15
WebProtégé: a collaborative Web-based platform for editing biomedical ontologies
ISSN: 1367-4803, 1367-4811, 1367-4811Published: England Oxford University Press 15.08.2014Published in Bioinformatics (Oxford, England) (15.08.2014)“… also features a simple user interface, which is geared towards editing the kinds of class descriptions and annotations that are prevalent throughout biomedical ontologies…”
Get full text
Journal Article -
16
Applying a Pairwise Coverage Criterion to Scenario-Based Testing
Published: IEEE 01.04.2016Published in 2016 IEEE Ninth International Conference on Software Testing, Verification and Validation Workshops (ICSTW) (01.04.2016)“… The originality of the approach lies in the fact that the pairwise criterion is applied to the instantiated method calls…”
Get full text
Conference Proceeding -
17
Package Fingerprints: A visual summary of package interface usage
ISSN: 0950-5849, 1873-6025Published: Amsterdam Elsevier B.V 01.12.2010Published in Information and software technology (01.12.2010)“… (class container, code ownership, etc.). Several approaches have been proposed, among which the use of cohesion and coupling metrics…”
Get full text
Journal Article -
18
Automated test-case generation by cloning
ISBN: 1467318213, 9781467318211Published: IEEE 01.06.2012Published in 2012 7th International Workshop on Automation of Software Test (AST) (01.06.2012)“…% of all test cases are clones; the maximum found was 42 %. The clones are not identical with their originals - identifiers of classes, methods, attributes and sometimes even order of statements and assertions differ…”
Get full text
Conference Proceeding -
19
Very high level programming with collection components
ISBN: 076950275X, 9780769502755Published: IEEE 1999Published in Object-Oriented Languages: Proceedings: 29th Conference on Technology of Object-Oriented Languages and Systems, 1999, Nancy, France (1999)“… are regarded as first class citizens and in which different implementations for a collection can be exchanged without affecting the correctness of a program and with minimal change to the source code…”
Get full text
Conference Proceeding -
20
EAM: Expansive Access Modifiers in OOP
ISBN: 9781424416912, 1424416914Published: IEEE 01.05.2008Published in 2008 International Conference on Computer and Communication Engineering (01.05.2008)“…Elements in OOP are classified under maximum five access modifiers which are: public, private, protected and etc. Although, they are useful to restrict the…”
Get full text
Conference Proceeding

