Výsledky vyhledávání - Java Container Class Methods
-
1
Using Semeru Cloud Compiler to Enhance Cloud-Native Java Application Performance
Vydáno: IEEE 11.11.2024Vydáno v 2024 34th International Conference on Collaborative Advances in Software and COmputiNg (CASCON) (11.11.2024)“…Java-based applications rely on just-in-time (JIT) compilation to convert bytecode into machine code at run-time to improve throughput…”
Získat plný text
Konferenční příspěvek -
2
Reverse-engineering 1-n associations from Java bytecode using alias analysis
ISSN: 0950-5849, 1873-6025Vydáno: Amsterdam Elsevier B.V 01.02.2007Vydáno v Information and software technology (01.02.2007)“… To implement 1-n associations, container classes, such as Vector in Java, are frequently used as programming language constructs…”
Získat plný text
Journal Article -
3
Unikernels vs Containers: An In-Depth Benchmarking Study in the Context of Microservice Applications
Vydáno: IEEE 01.11.2018Vydáno v 2018 IEEE 8th International Symposium on Cloud and Service Computing (SC2) (01.11.2018)“…Unikernels are a relatively recent way to create and quickly deploy extremely small virtual machines that do not require as much functional and operational software overhead as containers or virtual…”
Získat plný text
Konferenční příspěvek -
4
Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM
ISSN: 1615-5262, 1615-5270Vydáno: Berlin/Heidelberg Springer Berlin Heidelberg 01.02.2019Vydáno v International journal of information security (01.02.2019)“… This paper presents the process we used to gain access to the assets in the particular case of Java Card secure element…”
Získat plný text
Journal Article -
5
Containers on the Parallelization of General-Purpose Java Programs
ISSN: 0885-7458, 1573-7640Vydáno: New York Springer Nature B.V 01.12.2000Vydáno v International journal of parallel programming (01.12.2000)“… Focus is on general purpose Java programs with extensive use of Java container classes…”
Získat plný text
Journal Article -
6
Refactoring the aspectizable interfaces: an empirical assessment
ISSN: 0098-5589, 1939-3520Vydáno: New York IEEE 01.10.2005Vydáno v IEEE transactions on software engineering (01.10.2005)“… We call such interfaces aspectizable. All the aspectizable interfaces identified within a large number of classes from the Java Standard Library and from three Java applications have been automatically migrated to aspects…”
Získat plný text
Journal Article -
7
Using a multiple-delivery-mode training approach to develop local capacity and infrastructure for advanced bioinformatics in Africa
ISSN: 1553-734X, 1553-7358, 1553-7358Vydáno: United States Public Library of Science 01.02.2021Vydáno v PLoS computational biology (01.02.2021)“… along with a lack of local computational infrastructure and expertise. To address this, H3ABioNet developed a 16S rRNA Microbiome Intermediate Bioinformatics Training course, extending its remote classroom model…”
Získat plný text
Journal Article -
8
Coverage rewarded: Test input generation via adaptation-based programming
ISBN: 1457716380, 9781457716386ISSN: 1938-4300Vydáno: Washington, DC, USA IEEE Computer Society 06.11.2011Vydáno v 2011 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011) (06.11.2011)“… container classes, including random testing and shape-based abstraction…”
Získat plný text
Konferenční příspěvek -
9
The research and design of object container technique
ISBN: 9781467301985, 1467301981Vydáno: IEEE 01.05.2012Vydáno v 2012 International Conference on Systems and Informatics (01.05.2012)“…s. To solve the problem, this paper put forward data class object container method. This object container encapsulates direct access to the database in a base class and provides generic interface services…”
Získat plný text
Konferenční příspěvek -
10
Synthesizing Object Transformation for Dynamic Software Updating
Vydáno: IEEE 01.05.2017Vydáno v 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C) (01.05.2017)“… This paper presents AOTES, an approach to automating object transformations for dynamic updating of Java programs…”
Získat plný text
Konferenční příspěvek -
11
Leveraging Method Call Anomalies to Improve the Effectiveness of Spectrum-Based Fault Localization Techniques for Object-Oriented Programs
ISBN: 146732857X, 9781467328579ISSN: 1550-6002Vydáno: IEEE 01.08.2012Vydáno v 2012 12th International Conference on Quality Software (01.08.2012)“… First, we compute the suspiciousness for each class based on the difference in its method call sequences between passed and failed runs…”
Získat plný text
Konferenční příspěvek -
12
Refreshing patterns
ISSN: 0740-7459, 1937-4194Vydáno: Los Alamitos, CA IEEE 01.05.2006Vydáno v IEEE software (01.05.2006)“… So, the authors relied on abstract class definitions which opened the door for declaring default method implementations and common attributes…”
Získat plný text
Journal Article -
13
Documentation‐based functional constraint generation for library methods
ISSN: 0960-0833, 1099-1689Vydáno: Chichester Wiley Subscription Services, Inc 01.12.2021Vydáno v Software testing, verification & reliability (01.12.2021)“… To effectively analyse programmes built on top of software libraries, it is essential to have specifications for the library methods that can be easily processed by analysis tools…”
Získat plný text
Journal Article -
14
State generation and automated class testing
ISSN: 0960-0833, 1099-1689Vydáno: Chichester, UK John Wiley & Sons, Ltd 01.09.2000Vydáno v Software testing, verification & reliability (01.09.2000)“…The maturity of object‐oriented methods has led to the wide availability of container classes…”
Získat plný text
Journal Article -
15
WebProtégé: a collaborative Web-based platform for editing biomedical ontologies
ISSN: 1367-4803, 1367-4811, 1367-4811Vydáno: England Oxford University Press 15.08.2014Vydáno v Bioinformatics (Oxford, England) (15.08.2014)“… also features a simple user interface, which is geared towards editing the kinds of class descriptions and annotations that are prevalent throughout biomedical ontologies…”
Získat plný text
Journal Article -
16
Applying a Pairwise Coverage Criterion to Scenario-Based Testing
Vydáno: IEEE 01.04.2016Vydáno v 2016 IEEE Ninth International Conference on Software Testing, Verification and Validation Workshops (ICSTW) (01.04.2016)“… The originality of the approach lies in the fact that the pairwise criterion is applied to the instantiated method calls…”
Získat plný text
Konferenční příspěvek -
17
Package Fingerprints: A visual summary of package interface usage
ISSN: 0950-5849, 1873-6025Vydáno: Amsterdam Elsevier B.V 01.12.2010Vydáno v Information and software technology (01.12.2010)“… (class container, code ownership, etc.). Several approaches have been proposed, among which the use of cohesion and coupling metrics…”
Získat plný text
Journal Article -
18
Automated test-case generation by cloning
ISBN: 1467318213, 9781467318211Vydáno: IEEE 01.06.2012Vydáno v 2012 7th International Workshop on Automation of Software Test (AST) (01.06.2012)“…% of all test cases are clones; the maximum found was 42 %. The clones are not identical with their originals - identifiers of classes, methods, attributes and sometimes even order of statements and assertions differ…”
Získat plný text
Konferenční příspěvek -
19
Very high level programming with collection components
ISBN: 076950275X, 9780769502755Vydáno: IEEE 1999Vydáno v Object-Oriented Languages: Proceedings: 29th Conference on Technology of Object-Oriented Languages and Systems, 1999, Nancy, France (1999)“… are regarded as first class citizens and in which different implementations for a collection can be exchanged without affecting the correctness of a program and with minimal change to the source code…”
Získat plný text
Konferenční příspěvek -
20
EAM: Expansive Access Modifiers in OOP
ISBN: 9781424416912, 1424416914Vydáno: IEEE 01.05.2008Vydáno v 2008 International Conference on Computer and Communication Engineering (01.05.2008)“…Elements in OOP are classified under maximum five access modifiers which are: public, private, protected and etc. Although, they are useful to restrict the…”
Získat plný text
Konferenční příspěvek

