Výsledky vyhľadávania - java resource code check
-
1
Automated Validation of COBOL to Java Transformation
ISSN: 2643-1572Vydavateľské údaje: ACM 27.10.2024Vydané v IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (27.10.2024)“…Recent advances in Large Language Model (LLM) based Generative AI techniques have made it feasible to translate enterprise-level code from legacy languages such as COBOL to modern languages such as Java or Python…”
Získať plný text
Konferenčný príspevok.. -
2
Data Structures in Java
ISBN: 1683929551, 9781683929550Vydavateľské údaje: Herndon, VA Mercury Learning & Information 2023“… The first chapter contains a quick introduction to Java, along with Java code samples to check for leap years, find divisors of a number, and work with arrays of strings…”
Získať plný text
E-kniha -
3
Performance Analysis and Comparison of Node.Js and Java Spring Boot in Implementation of Restful Applications
ISSN: 0038-0644, 1097-024XVydavateľské údaje: Hoboken, USA John Wiley & Sons, Inc 01.07.2025Vydané v Software, practice & experience (01.07.2025)“… Objectives The main objective of this work is to check and compare the performance between Node.js and Java Spring Boot, in the context of implementing RESTful applications. REST…”
Získať plný text
Journal Article -
4
Detecting Vulnerable Java Classes Based on the Analysis of Java Library Call Graph
“…Java Virtual Machine relies on the SecurityManager class to prevent illegal system resource access by external Java code (e.g., Java Applet…”Vydavateľské údaje: IEEE 01.07.2018
Získať plný text
Konferenčný príspevok.. -
5
Statically Checking Web API Requests in JavaScript
ISSN: 1558-1225Vydavateľské údaje: IEEE 01.05.2017Vydané v Proceedings / International Conference on Software Engineering (01.05.2017)“… In this paper, we propose an approach to statically check web API requests in JavaScript. Our approach first extracts a request's URL string, HTTP method…”
Získať plný text
Konferenčný príspevok.. -
6
Knowledge-Based Verification of Concatenative Programming Patterns Inspired by Natural Language for Resource-Constrained Embedded Devices
ISSN: 1424-8220, 1424-8220Vydavateľské údaje: Switzerland MDPI AG 26.12.2020Vydané v Sensors (Basel, Switzerland) (26.12.2020)“… to be shared, kept up to date, and synchronized across a set of devices. Moreover, the computational paradigm we use for effective distributed execution of symbolic code on resource-constrained devices encourages the adoption of such patterns…”
Získať plný text
Journal Article -
7
Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges and Solutions for Analyzing Android
ISSN: 0098-5589, 1939-3520Vydavateľské údaje: New York IEEE 01.06.2014Vydané v IEEE transactions on software engineering (01.06.2014)“…A common security architecture is based on the protection of certain resources by permission checks (used e.g…”
Získať plný text
Journal Article -
8
Test Flakiness Across Programming Languages
ISSN: 0098-5589, 1939-3520Vydavateľské údaje: New York IEEE 01.04.2023Vydané v IEEE transactions on software engineering (01.04.2023)“…Regression Testing (RT) is a quality-assurance practice commonly adopted in the software industry to check if functionality remains intact after code changes…”
Získať plný text
Journal Article -
9
Horizontal Scaling Implementation with Container Orchestrator. Reliability Analysis during Stress and Performance Testing
ISSN: 1582-7445, 1844-7600Vydavateľské údaje: Suceava Stefan cel Mare University of Suceava 01.08.2024Vydané v Advances in Electrical and Computer Engineering (01.08.2024)“…Software platforms' infrastructure encompasses the collection of physical resources used concomitantly for user interactions, computational or persistence operations…”
Získať plný text
Journal Article -
10
Light-weight resource leak testing based on finalisers
ISSN: 1751-8806, 1751-8814, 1751-8814Vydavateľské údaje: Stevenage The Institution of Engineering and Technology 01.12.2013Vydané v IET software (01.12.2013)“… In this study, the authors propose an easy-to-use yet effective resource leak testing approach for Java programs based on existing finalisers of Java Application Programming Interface (API) classes…”
Získať plný text
Journal Article -
11
Solidity Programming Essentials: A Beginner's Guide to Build Smart Contracts for Ethereum and Blockchain
ISBN: 9781788831383, 1788831381Vydavateľské údaje: Birmingham Packt Publishing, Limited 2018“…Solidity is a new contract-oriented programming language popular for creating smart contracts and distributed applications. Writing smart contracts targeting…”
Získať plný text
E-kniha -
12
Inference of Resource Management Specifications
ISSN: 2475-1421, 2475-1421Vydavateľské údaje: New York, NY, USA ACM 16.10.2023Vydané v Proceedings of ACM on programming languages (16.10.2023)“…A resource leak occurs when a program fails to free some finite resource after it is no longer needed…”
Získať plný text
Journal Article -
13
JAuthGuard: Automatic Detection for Broken Access Control in Java Web APIs
Vydavateľské údaje: IEEE 05.10.2025Vydané v 2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC) (05.10.2025)“…) vulnerabilities, which may allow unauthorized users to access restricted resources. This paper proposed an automated detection method for BAC vulnerabilities at the API level in Java Web applications…”
Získať plný text
Konferenčný príspevok.. -
14
Open-Source Education Development: An Experiential Capstone Report
ISSN: 2769-5654Vydavateľské údaje: IEEE 01.12.2022Vydané v Proceedings (International Conference on Computational Science and Computational Intelligence) (01.12.2022)“… Last semester, my client gave my group the task of creating an LMS embeddable application to check basic Java syntax for introductory computer science courses…”
Získať plný text
Konferenčný príspevok.. -
15
Java Runtime Optimization for Copying Arrays on AArch64
ISSN: 2637-9511Vydavateľské údaje: IEEE 06.06.2023Vydané v Mediterranean Conference on Embedded Computing (New Jersey. Online) (06.06.2023)“…One of the architectures supported by OpenJ9, the AArch64 platform, is widely used in electronic devices because of its reasonable price and resource efficiency…”
Získať plný text
Konferenčný príspevok.. -
16
Tool demonstration: CHET: checking specifications in Java systems
ISBN: 0769522548, 9780769522548ISSN: 1092-8138Vydavateľské údaje: IEEE 2005Vydané v 13th International Workshop on Program Comprehension (IWPC'05) (2005)“… Our system, CHET, lets developers define specifications that describe how a component should be used and checks these specifications statically in real Java systems…”
Získať plný text
Konferenčný príspevok.. -
17
INCREASING THE WIRELESS SYSTEMS INFORMATION EFFICIENCY USING LDPC CODING
ISSN: 2312-4121, 2411-2976Vydavateľské údaje: National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute” 02.07.2019Vydané v Information and Telecommunication Sciences (02.07.2019)“…Background. LDPC codes research is performed in the paper. The influence of LDPC codes on channel information efficiency is studied in scope of MCS…”
Získať plný text
Journal Article -
18
A Car Racer JavaScript Game Exercise Using Vanilla JavaScript
Vydavateľské údaje: 01.01.2018“…Create a custom JavaScript Car racer game from scratch using only JavaScript - Practice Exercises.About This Video…”
Získať plný text
Streaming Video -
19
Evaluating Design Tradeoffs in Numeric Static Analysis for Java
ISSN: 2331-8422Vydavateľské údaje: Ithaca Cornell University Library, arXiv.org 24.02.2018Vydané v arXiv.org (24.02.2018)“…Numeric static analysis for Java has a broad range of potentially useful applications, including array bounds checking and resource usage estimation…”
Získať plný text
Paper -
20
Hidden Path: Understanding the Intermediary in Malicious Redirections
ISSN: 1556-6013, 1556-6021Vydavateľské údaje: New York IEEE 2022Vydané v IEEE transactions on information forensics and security (2022)“… In this paper, we conduct the first large-scale measurement study on how adversaries leverage URL redirection to circumvent security checks and distribute malicious content in practice…”
Získať plný text
Journal Article

