Search Results - Java Container Class Methods

Refine Results
  1. 1

    Using Semeru Cloud Compiler to Enhance Cloud-Native Java Application Performance by Liu, Ryan, Shinde, Shreya, Tahvildari, Ladan, Stoodley, Mark, Sundaresan, Vijay, Pirvu, Marius

    Published: IEEE 11.11.2024
    “…Java-based applications rely on just-in-time (JIT) compilation to convert bytecode into machine code at run-time to improve throughput…”
    Get full text
    Conference Proceeding
  2. 2

    Reverse-engineering 1-n associations from Java bytecode using alias analysis by Kang, Yoohoon, Park, Chanjin, Wu, Chisu

    ISSN: 0950-5849, 1873-6025
    Published: Amsterdam Elsevier B.V 01.02.2007
    Published in Information and software technology (01.02.2007)
    “… To implement 1-n associations, container classes, such as Vector in Java, are frequently used as programming language constructs…”
    Get full text
    Journal Article
  3. 3

    Unikernels vs Containers: An In-Depth Benchmarking Study in the Context of Microservice Applications by Goethals, Tom, Sebrechts, Merlijn, Atrey, Ankita, Volckaert, Bruno, De Turck, Filip

    Published: IEEE 01.11.2018
    “…Unikernels are a relatively recent way to create and quickly deploy extremely small virtual machines that do not require as much functional and operational software overhead as containers or virtual…”
    Get full text
    Conference Proceeding
  4. 4

    Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM by Mesbah, Abdelhak, Lanet, Jean-Louis, Mezghiche, Mohamed

    ISSN: 1615-5262, 1615-5270
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.02.2019
    “… This paper presents the process we used to gain access to the assets in the particular case of Java Card secure element…”
    Get full text
    Journal Article
  5. 5

    Containers on the Parallelization of General-Purpose Java Programs by Wu, Peng, Padua, David

    ISSN: 0885-7458, 1573-7640
    Published: New York Springer Nature B.V 01.12.2000
    “… Focus is on general purpose Java programs with extensive use of Java container classes…”
    Get full text
    Journal Article
  6. 6

    Refactoring the aspectizable interfaces: an empirical assessment by Tonella, P., Ceccato, M.

    ISSN: 0098-5589, 1939-3520
    Published: New York IEEE 01.10.2005
    Published in IEEE transactions on software engineering (01.10.2005)
    “… We call such interfaces aspectizable. All the aspectizable interfaces identified within a large number of classes from the Java Standard Library and from three Java applications have been automatically migrated to aspects…”
    Get full text
    Journal Article
  7. 7

    Using a multiple-delivery-mode training approach to develop local capacity and infrastructure for advanced bioinformatics in Africa by Ras, V, Botha, G, Aron, S

    ISSN: 1553-734X, 1553-7358, 1553-7358
    Published: United States Public Library of Science 01.02.2021
    Published in PLoS computational biology (01.02.2021)
    “… along with a lack of local computational infrastructure and expertise. To address this, H3ABioNet developed a 16S rRNA Microbiome Intermediate Bioinformatics Training course, extending its remote classroom model…”
    Get full text
    Journal Article
  8. 8

    Coverage rewarded: Test input generation via adaptation-based programming by Groce, Alex

    ISBN: 1457716380, 9781457716386
    ISSN: 1938-4300
    Published: Washington, DC, USA IEEE Computer Society 06.11.2011
    “… container classes, including random testing and shape-based abstraction…”
    Get full text
    Conference Proceeding
  9. 9

    The research and design of object container technique by Hai-yan Wu, Xin Meng

    ISBN: 9781467301985, 1467301981
    Published: IEEE 01.05.2012
    “…s. To solve the problem, this paper put forward data class object container method. This object container encapsulates direct access to the database in a base class and provides generic interface services…”
    Get full text
    Conference Proceeding
  10. 10

    Synthesizing Object Transformation for Dynamic Software Updating by Tianxiao Gu, Xiaoxing Ma, Chang Xu, Yanyan Jiang, Chun Cao, Jian Lu

    Published: IEEE 01.05.2017
    “… This paper presents AOTES, an approach to automating object transformations for dynamic updating of Java programs…”
    Get full text
    Conference Proceeding
  11. 11

    Leveraging Method Call Anomalies to Improve the Effectiveness of Spectrum-Based Fault Localization Techniques for Object-Oriented Programs by Jingxuan Tu, Lin Chen, Yuming Zhou, Jianjun Zhao, Baowen Xu

    ISBN: 146732857X, 9781467328579
    ISSN: 1550-6002
    Published: IEEE 01.08.2012
    “… First, we compute the suspiciousness for each class based on the difference in its method call sequences between passed and failed runs…”
    Get full text
    Conference Proceeding
  12. 12

    Refreshing patterns by Wirfs-Brock, R.J.

    ISSN: 0740-7459, 1937-4194
    Published: Los Alamitos, CA IEEE 01.05.2006
    Published in IEEE software (01.05.2006)
    “… So, the authors relied on abstract class definitions which opened the door for declaring default method implementations and common attributes…”
    Get full text
    Journal Article
  13. 13

    Documentation‐based functional constraint generation for library methods by Jiang, Renhe, Chen, Zhengzhao, Pei, Yu, Pan, Minxue, Zhang, Tian, Li, Xuandong

    ISSN: 0960-0833, 1099-1689
    Published: Chichester Wiley Subscription Services, Inc 01.12.2021
    “… To effectively analyse programmes built on top of software libraries, it is essential to have specifications for the library methods that can be easily processed by analysis tools…”
    Get full text
    Journal Article
  14. 14

    State generation and automated class testing by Ball, Thomas, Hoffman, Daniel, Ruskey, Frank, Webber, Richard, White, Lee

    ISSN: 0960-0833, 1099-1689
    Published: Chichester, UK John Wiley & Sons, Ltd 01.09.2000
    “…The maturity of object‐oriented methods has led to the wide availability of container classes…”
    Get full text
    Journal Article
  15. 15

    WebProtégé: a collaborative Web-based platform for editing biomedical ontologies by Horridge, Matthew, Tudorache, Tania, Nuylas, Csongor, Vendetti, Jennifer, Noy, Natalya F., Musen, Mark A.

    ISSN: 1367-4803, 1367-4811, 1367-4811
    Published: England Oxford University Press 15.08.2014
    Published in Bioinformatics (Oxford, England) (15.08.2014)
    “… also features a simple user interface, which is geared towards editing the kinds of class descriptions and annotations that are prevalent throughout biomedical ontologies…”
    Get full text
    Journal Article
  16. 16

    Applying a Pairwise Coverage Criterion to Scenario-Based Testing by Bousquet, L. Du, Delahaye, M., Oriat, C.

    Published: IEEE 01.04.2016
    “… The originality of the approach lies in the fact that the pairwise criterion is applied to the instantiated method calls…”
    Get full text
    Conference Proceeding
  17. 17

    Package Fingerprints: A visual summary of package interface usage by Abdeen, Hani, Ducasse, Stéphane, Pollet, Damien, Alloui, Ilham

    ISSN: 0950-5849, 1873-6025
    Published: Amsterdam Elsevier B.V 01.12.2010
    Published in Information and software technology (01.12.2010)
    “… (class container, code ownership, etc.). Several approaches have been proposed, among which the use of cohesion and coupling metrics…”
    Get full text
    Journal Article
  18. 18

    Automated test-case generation by cloning by Landhausser, M., Tichy, W. F.

    ISBN: 1467318213, 9781467318211
    Published: IEEE 01.06.2012
    “…% of all test cases are clones; the maximum found was 42 %. The clones are not identical with their originals - identifiers of classes, methods, attributes and sometimes even order of statements and assertions differ…”
    Get full text
    Conference Proceeding
  19. 19

    Very high level programming with collection components by Evered, M., Menger, G.

    ISBN: 076950275X, 9780769502755
    Published: IEEE 1999
    “… are regarded as first class citizens and in which different implementations for a collection can be exchanged without affecting the correctness of a program and with minimal change to the source code…”
    Get full text
    Conference Proceeding
  20. 20

    EAM: Expansive Access Modifiers in OOP by Farkhani, T.R., Razzazi, M., Teymoori, P.

    ISBN: 9781424416912, 1424416914
    Published: IEEE 01.05.2008
    “…Elements in OOP are classified under maximum five access modifiers which are: public, private, protected and etc. Although, they are useful to restrict the…”
    Get full text
    Conference Proceeding