Search Results - java resource code check
-
1
Automated Validation of COBOL to Java Transformation
ISSN: 2643-1572Published: ACM 27.10.2024Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (27.10.2024)“…Recent advances in Large Language Model (LLM) based Generative AI techniques have made it feasible to translate enterprise-level code from legacy languages such as COBOL to modern languages such as Java or Python…”
Get full text
Conference Proceeding -
2
Data Structures in Java
ISBN: 1683929551, 9781683929550Published: Herndon, VA Mercury Learning & Information 2023“… The first chapter contains a quick introduction to Java, along with Java code samples to check for leap years, find divisors of a number, and work with arrays of strings…”
Get full text
eBook -
3
Performance Analysis and Comparison of Node.Js and Java Spring Boot in Implementation of Restful Applications
ISSN: 0038-0644, 1097-024XPublished: Hoboken, USA John Wiley & Sons, Inc 01.07.2025Published in Software, practice & experience (01.07.2025)“… Objectives The main objective of this work is to check and compare the performance between Node.js and Java Spring Boot, in the context of implementing RESTful applications. REST…”
Get full text
Journal Article -
4
Detecting Vulnerable Java Classes Based on the Analysis of Java Library Call Graph
Published: IEEE 01.07.2018Published in 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) (01.07.2018)“…Java Virtual Machine relies on the SecurityManager class to prevent illegal system resource access by external Java code (e.g., Java Applet…”
Get full text
Conference Proceeding -
5
Statically Checking Web API Requests in JavaScript
ISSN: 1558-1225Published: IEEE 01.05.2017Published in Proceedings / International Conference on Software Engineering (01.05.2017)“… In this paper, we propose an approach to statically check web API requests in JavaScript. Our approach first extracts a request's URL string, HTTP method…”
Get full text
Conference Proceeding -
6
Knowledge-Based Verification of Concatenative Programming Patterns Inspired by Natural Language for Resource-Constrained Embedded Devices
ISSN: 1424-8220, 1424-8220Published: Switzerland MDPI AG 26.12.2020Published in Sensors (Basel, Switzerland) (26.12.2020)“… to be shared, kept up to date, and synchronized across a set of devices. Moreover, the computational paradigm we use for effective distributed execution of symbolic code on resource-constrained devices encourages the adoption of such patterns…”
Get full text
Journal Article -
7
Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges and Solutions for Analyzing Android
ISSN: 0098-5589, 1939-3520Published: New York IEEE 01.06.2014Published in IEEE transactions on software engineering (01.06.2014)“…A common security architecture is based on the protection of certain resources by permission checks (used e.g…”
Get full text
Journal Article -
8
Test Flakiness Across Programming Languages
ISSN: 0098-5589, 1939-3520Published: New York IEEE 01.04.2023Published in IEEE transactions on software engineering (01.04.2023)“…Regression Testing (RT) is a quality-assurance practice commonly adopted in the software industry to check if functionality remains intact after code changes…”
Get full text
Journal Article -
9
Horizontal Scaling Implementation with Container Orchestrator. Reliability Analysis during Stress and Performance Testing
ISSN: 1582-7445, 1844-7600Published: Suceava Stefan cel Mare University of Suceava 01.08.2024Published in Advances in Electrical and Computer Engineering (01.08.2024)“…Software platforms' infrastructure encompasses the collection of physical resources used concomitantly for user interactions, computational or persistence operations…”
Get full text
Journal Article -
10
Light-weight resource leak testing based on finalisers
ISSN: 1751-8806, 1751-8814, 1751-8814Published: Stevenage The Institution of Engineering and Technology 01.12.2013Published in IET software (01.12.2013)“… In this study, the authors propose an easy-to-use yet effective resource leak testing approach for Java programs based on existing finalisers of Java Application Programming Interface (API) classes…”
Get full text
Journal Article -
11
Solidity Programming Essentials: A Beginner's Guide to Build Smart Contracts for Ethereum and Blockchain
ISBN: 9781788831383, 1788831381Published: Birmingham Packt Publishing, Limited 2018“…Solidity is a new contract-oriented programming language popular for creating smart contracts and distributed applications. Writing smart contracts targeting…”
Get full text
eBook -
12
Inference of Resource Management Specifications
ISSN: 2475-1421, 2475-1421Published: New York, NY, USA ACM 16.10.2023Published in Proceedings of ACM on programming languages (16.10.2023)“…A resource leak occurs when a program fails to free some finite resource after it is no longer needed…”
Get full text
Journal Article -
13
JAuthGuard: Automatic Detection for Broken Access Control in Java Web APIs
Published: IEEE 05.10.2025Published in 2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC) (05.10.2025)“…) vulnerabilities, which may allow unauthorized users to access restricted resources. This paper proposed an automated detection method for BAC vulnerabilities at the API level in Java Web applications…”
Get full text
Conference Proceeding -
14
Open-Source Education Development: An Experiential Capstone Report
ISSN: 2769-5654Published: IEEE 01.12.2022Published in Proceedings (International Conference on Computational Science and Computational Intelligence) (01.12.2022)“… Last semester, my client gave my group the task of creating an LMS embeddable application to check basic Java syntax for introductory computer science courses…”
Get full text
Conference Proceeding -
15
Java Runtime Optimization for Copying Arrays on AArch64
ISSN: 2637-9511Published: IEEE 06.06.2023Published in Mediterranean Conference on Embedded Computing (New Jersey. Online) (06.06.2023)“…One of the architectures supported by OpenJ9, the AArch64 platform, is widely used in electronic devices because of its reasonable price and resource efficiency…”
Get full text
Conference Proceeding -
16
Tool demonstration: CHET: checking specifications in Java systems
ISBN: 0769522548, 9780769522548ISSN: 1092-8138Published: IEEE 2005Published in 13th International Workshop on Program Comprehension (IWPC'05) (2005)“… Our system, CHET, lets developers define specifications that describe how a component should be used and checks these specifications statically in real Java systems…”
Get full text
Conference Proceeding -
17
INCREASING THE WIRELESS SYSTEMS INFORMATION EFFICIENCY USING LDPC CODING
ISSN: 2312-4121, 2411-2976Published: National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute” 02.07.2019Published in Information and Telecommunication Sciences (02.07.2019)“…Background. LDPC codes research is performed in the paper. The influence of LDPC codes on channel information efficiency is studied in scope of MCS…”
Get full text
Journal Article -
18
A Car Racer JavaScript Game Exercise Using Vanilla JavaScript
Published: 01.01.2018“…Create a custom JavaScript Car racer game from scratch using only JavaScript - Practice Exercises.About This Video…”
Get full text
Streaming Video -
19
Evaluating Design Tradeoffs in Numeric Static Analysis for Java
ISSN: 2331-8422Published: Ithaca Cornell University Library, arXiv.org 24.02.2018Published in arXiv.org (24.02.2018)“…Numeric static analysis for Java has a broad range of potentially useful applications, including array bounds checking and resource usage estimation…”
Get full text
Paper -
20
Hidden Path: Understanding the Intermediary in Malicious Redirections
ISSN: 1556-6013, 1556-6021Published: New York IEEE 2022Published in IEEE transactions on information forensics and security (2022)“… In this paper, we conduct the first large-scale measurement study on how adversaries leverage URL redirection to circumvent security checks and distribute malicious content in practice…”
Get full text
Journal Article

