Search Results - "java programs"

Refine Results
  1. 1

    Bugs.jar: a large-scale, diverse dataset of real-world Java bugs by Saha, Ripon K., Lyu, Yingjun, Lam, Wing, Yoshida, Hiroaki, Prasad, Mukul R.

    ISBN: 9781450357166, 1450357164
    ISSN: 2574-3864
    Published: New York, NY, USA ACM 28.05.2018
    “…We present Bugs.jar, a large-scale dataset for research in automated debugging, patching, and testing of Java programs. Bugs.jar is comprised of 1,158 bugs and…”
    Get full text
    Conference Proceeding
  2. 2

    A Rule-Based Approach for Animating Java Algorithms by Sharaf, Nada, Abdennadher, Slim, Fruhwirth, Thom

    ISSN: 2375-0138
    Published: IEEE 01.07.2016
    “…Over the past years, visualization of programs has been widely applied. Algorithm animation was proven to aid in teaching and learning. It provides a…”
    Get full text
    Conference Proceeding Journal Article
  3. 3

    Integrating Evolutionary Testing with Reinforcement Learning for Automated Test Generation of Object‐Oriented Software by He, Wei, Zhao, Ruilian, Zhu, Qunxiong

    ISSN: 1022-4653, 2075-5597
    Published: Published by the IET on behalf of the CIE 01.01.2015
    Published in Chinese Journal of Electronics (01.01.2015)
    “…Recent advances in evolutionary test generation greatly facilitate the testing of Object‐oriented (OO) software. Existing test generation approaches are still…”
    Get full text
    Journal Article
  4. 4

    Light-weight resource leak testing based on finalisers by Dai, Ziying, Mao, Xiaoguang

    ISSN: 1751-8806, 1751-8814, 1751-8814
    Published: Stevenage The Institution of Engineering and Technology 01.12.2013
    Published in IET software (01.12.2013)
    “…Despite garbage collectors, programmers must manually manage many non-memory ‘finite system resources’ such as file descriptors and database connections…”
    Get full text
    Journal Article
  5. 5

    Test suite prioritisation using trace events technique by Rajarathinam, Kavitha, Natarajan, Sureshkumar

    ISSN: 1751-8806, 1751-8814, 1751-8814
    Published: Stevenage The Institution of Engineering and Technology 01.04.2013
    Published in IET software (01.04.2013)
    “…The size of the test suite and the duration of time determines the time taken by the regression testing. Conversely, the testers can prioritise the test cases…”
    Get full text
    Journal Article
  6. 6

    Towards Using LLMs in the Reverse Engineering of Software Systems to Object Constraint Language by Siala, Hanan A., Lano, Kevin

    ISSN: 2640-7574
    Published: IEEE 04.03.2025
    “…Using reverse engineering to extract semantic representations from software systems is beneficial for the understanding of these systems, and can facilitate…”
    Get full text
    Conference Proceeding
  7. 7

    Using Large Language Models to Extract UML Class Diagrams from Java Programs by Siala, Hanan Abdulwahab, Lano, Kevin

    Published: IEEE 04.04.2025
    “…Many organizations rely on software systems to perform their core business operations. These systems often require modernization to accommodate new…”
    Get full text
    Conference Proceeding
  8. 8

    Creation of a retrospective searchable neuropathologic database from print archives at Toronto's University Health Network by Ehsani, Sepehr, Kiehl, Tim-Rasmus, Bernstein, Andrea, Gentili, Fred, Asa, Sylvia L, Croul, Sidney E

    ISSN: 0023-6837, 1530-0307, 1530-0307
    Published: New York Elsevier Inc 01.01.2008
    Published in Laboratory investigation (01.01.2008)
    “…University Health Network (UHN) Pathology, in its capacity of providing neuro-oncologic care, now utilizes a laboratory information system (LIS), which was…”
    Get full text
    Journal Article
  9. 9

    Developing Cross‐Platform and Cross‐Language Applications by Gregoire, Marc

    ISBN: 9781119695400, 1119695406
    Published: Indianapolis, Indiana John Wiley & Sons, Inc 24.02.2021
    Published in Professional C++ (24.02.2021)
    “…C++ programs can be compiled to run on a variety of computing platforms, and the language has been rigorously defined to ensure that programming in C++ for one…”
    Get full text
    Book Chapter
  10. 10

    Towards the memory forensics of OOP execution behavior by Al-Sharif, Ziad A., Al-Saleh, Mohammad I., Alawneh, Luay

    Published: IEEE 01.08.2017
    “…Perpetrators might employ computer programs (software) to perform their offenses or to cover their wrongdoings. Program's source code, in particular variables…”
    Get full text
    Conference Proceeding
  11. 11

    JFORTES: Java Formal Unit TESt Generation by Bentes, Larissa, Rocha, Herbert, Valentin, Eduardo, Barreto, Raimundo

    ISSN: 2324-7894
    Published: IEEE 01.11.2016
    “…The use of computer-based systems has increased significantly over the last years in several domains, mainly when we take into account the applications running…”
    Get full text
    Conference Proceeding
  12. 12

    The JK system to detect plagiarism by Sabri, Khair Eddin M, Al-Ja'afer, Jubair J

    ISSN: 1666-6046, 1666-6038
    Published: La Plata Graduate Network of Argentine Universities with Computer Science Schools (RedUNCI) 01.10.2006
    Published in Journal of Computer Science & Technology (01.10.2006)
    “…In this research a system, referred to as Jubair-Khaireddin (JK), has been developed to assess the degree of similarity between two programs even though they…”
    Get full text
    Journal Article
  13. 13

    Formal Verification of Protocol Properties of Sequential Java Programs by Ying Jin

    ISBN: 9780769528700, 0769528708
    ISSN: 0730-3157
    Published: IEEE 01.07.2007
    “…Protocol properties are essential properties in reusable library classes and object-oriented application frameworks. A protocol is the order in which the…”
    Get full text
    Conference Proceeding
  14. 14

    A practical method for watermarking Java programs by Monden, A., Iida, H., Matsumoto, K., Inoue, K., Torii, K.

    ISBN: 0769507921, 9780769507927
    ISSN: 0730-3157
    Published: IEEE 2000
    “…Java programs distributed through the Internet are now suffering from program theft. This is because Java programs can be easily decomposed into reusable class…”
    Get full text
    Conference Proceeding Journal Article
  15. 15

    Runtime verification on abstract finite state models by Jevitha, K.P., Jayaraman, Bharat, Sethumadhavan, M.

    ISSN: 0164-1212, 1873-1228
    Published: Elsevier Inc 01.10.2024
    Published in The Journal of systems and software (01.10.2024)
    “…Finite-state models are ubiquitous in the study of concurrent systems, especially controllers and servers that operate in a repetitive cycle. In this paper, we…”
    Get full text
    Journal Article
  16. 16

    The ART of Sharing Points-to Analysis: Reusing Points-to Analysis Results Safely and Efficiently by Halalingaiah, Shashin, Sundaresan, Vijay, Maier, Daryl, Nandivada, V. Krishna

    ISSN: 2475-1421, 2475-1421
    Published: New York, NY, USA ACM 08.10.2024
    “…Data-flow analyses like points-to analysis can vastly improve the precision of other analyses, and enable powerful code optimizations. However, whole-program…”
    Get full text
    Journal Article
  17. 17

    IGAOD: An online design framework for interactive genetic algorithms by Huang, DongBo, Xu, Xing

    ISSN: 2352-7110, 2352-7110
    Published: Elsevier 01.07.2022
    Published in SoftwareX (01.07.2022)
    “…In order to prompt the theoretical research and application of interactive genetic algorithm (IGA), the framework for IGAOD (Interactive Genetic Algorithm…”
    Get full text
    Journal Article
  18. 18

    Compact visualization of Java program execution by Jayaraman, S., Jayaraman, B., Lessa, D.

    ISSN: 0038-0644, 1097-024X
    Published: Bognor Regis Wiley Subscription Services, Inc 01.02.2017
    Published in Software, practice & experience (01.02.2017)
    “…Summary The context of this work is a practical, open‐source visualization system, called JIVE, that supports two forms of runtime visualizations of Java…”
    Get full text
    Journal Article
  19. 19

    Personalised news filtering and recommendation system using Chi-square statistics-based K-nearest neighbour (χ2SB-KNN) model by Adeniyi, D. A., Wei, Z., Yang, Y.

    ISSN: 1751-7575, 1751-7583
    Published: Taylor & Francis 21.10.2017
    Published in Enterprise information systems (21.10.2017)
    “…Recommendation problem has been extensively studied by researchers in the field of data mining, database and information retrieval. This study presents the…”
    Get full text
    Journal Article
  20. 20

    Computer‐based boiler efficiency improvement by Said, Samah M., Hamouda, Asmaa S., Mahmaoud, Hamada, Abd‐Elwahab, Said

    ISSN: 1944-7442, 1944-7450
    Published: Hoboken, USA John Wiley & Sons, Inc 01.09.2019
    “…This article was concerned with calculating efficiency of boilers which are the most important types of performance measurements in a steam system. A Java…”
    Get full text
    Journal Article