Search Results - java resource code check*
-
1
Lightweight and modular resource leak checking (extended version)
ISSN: 1433-2779, 1433-2787Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.04.2025Published in International journal on software tools for technology transfer (01.04.2025)“… it. Resource leaks cause resource starvation, slowdowns, and crashes. Previous techniques to prevent resource leaks are either unsound, imprecise, inapplicable to existing code, slow, or a combination…”
Get full text
Journal Article -
2
Statically Checking Web API Requests in JavaScript
ISSN: 1558-1225Published: IEEE 01.05.2017Published in Proceedings / International Conference on Software Engineering (01.05.2017)“… Traditional compile-time error checking, such as calling a non-existent method in Java, are not available for checking whether such requests comply with the requirements of a web API…”
Get full text
Conference Proceeding -
3
Efficient runtime metaprogramming services for Java
ISSN: 0164-1212, 1873-1228Published: Elsevier Inc 01.07.2019Published in The Journal of systems and software (01.07.2019)“…•JMPLib consumes fewer memory resources than the rest of implementations for the JVM. The Java programming language and platform provide many optimizations to execute statically typed code efficiently…”
Get full text
Journal Article -
4
Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges and Solutions for Analyzing Android
ISSN: 0098-5589, 1939-3520Published: New York IEEE 01.06.2014Published in IEEE transactions on software engineering (01.06.2014)“…A common security architecture is based on the protection of certain resources by permission checks (used e.g…”
Get full text
Journal Article -
5
Detecting Vulnerable Java Classes Based on the Analysis of Java Library Call Graph
Published: IEEE 01.07.2018Published in 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) (01.07.2018)“…Java Virtual Machine relies on the SecurityManager class to prevent illegal system resource access by external Java code (e.g., Java Applet…”
Get full text
Conference Proceeding -
6
Solidity Programming Essentials: A Beginner's Guide to Build Smart Contracts for Ethereum and Blockchain
ISBN: 9781788831383, 1788831381Published: Birmingham Packt Publishing, Limited 2018“…Solidity is a new contract-oriented programming language popular for creating smart contracts and distributed applications. Writing smart contracts targeting…”
Get full text
eBook -
7
Improving the scalability of directed model checking of concurrent java code through hybrid and distributed analysis
ISBN: 9781369046816, 1369046812Published: ProQuest Dissertations & Theses 01.01.2016“… programmers to take advantage of this abundance of computational resources. However, the need for speed has also given new life to ancient evils, namely concurrency bugs…”
Get full text
Dissertation -
8
Inference of Resource Management Specifications
ISSN: 2475-1421, 2475-1421Published: New York, NY, USA ACM 16.10.2023Published in Proceedings of ACM on programming languages (16.10.2023)“… Such leaks are a significant cause of real-world crashes and performance problems. Recent work proposed an approach to prevent resource leaks based on checking resource management specifications…”
Get full text
Journal Article -
9
Deriving an information flow checker and certifying compiler for Java
ISBN: 0769525741, 9780769525747ISSN: 1081-6011Published: IEEE 2006Published in 2006 IEEE Symposium on Security and Privacy (S&P'06) (2006)“…Language-based security provides a means to enforce end-to-end confidentiality and integrity policies in mobile code scenarios, and is increasingly being contemplated by the smart-card and mobile…”
Get full text
Conference Proceeding -
10
Tool demonstration: CHET: checking specifications in Java systems
ISBN: 0769522548, 9780769522548ISSN: 1092-8138Published: IEEE 2005Published in 13th International Workshop on Program Comprehension (IWPC'05) (2005)“… Our system, CHET, lets developers define specifications that describe how a component should be used and checks these specifications statically in real Java systems…”
Get full text
Conference Proceeding -
11
Probabilistic program performance analysis with confidence intervals
ISSN: 0950-5849, 1873-6025Published: Elsevier B.V 01.04.2023Published in Information and software technology (01.04.2023)“… The paper introduces a method for the formal analysis of timing, resource use, cost and other quality aspects of computer programs, and a tool that automates the application of the method to Java code…”
Get full text
Journal Article -
12
INCREASING THE WIRELESS SYSTEMS INFORMATION EFFICIENCY USING LDPC CODING
ISSN: 2312-4121, 2411-2976Published: National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute” 02.07.2019Published in Information and Telecommunication Sciences (02.07.2019)“…Background. LDPC codes research is performed in the paper. The influence of LDPC codes on channel information efficiency is studied in scope of MCS…”
Get full text
Journal Article -
13
Automated Validation of COBOL to Java Transformation
ISSN: 2643-1572Published: ACM 27.10.2024Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (27.10.2024)“…Recent advances in Large Language Model (LLM) based Generative AI techniques have made it feasible to translate enterprise-level code from legacy languages such as COBOL to modern languages such as Java or Python…”
Get full text
Conference Proceeding -
14
Type Checking for Reliable APIs
Published: IEEE 01.05.2017Published in 2017 IEEE/ACM 1st International Workshop on API Usage and Evolution (WAPI) (01.05.2017)“… To achieve this, we design a type system for implementing apluggable checker on the Java's compiler and find at compile timeinsufficient checking bugs that can lead to application crashesdue to malformed inputs…”
Get full text
Conference Proceeding -
15
Automatic security verification of mobile app configurations
ISSN: 0167-739X, 1872-7115Published: Elsevier B.V 01.03.2018Published in Future generation computer systems (01.03.2018)“… However, it also increases the security concerns, since a compromised device could disruptively access the resources of the organization…”
Get full text
Journal Article -
16
Blockchain Quick Start Guide: A Beginner's Guide to Developing Enterprise-Grade Decentralized Applications
ISBN: 1789807972, 9781789807974Published: Birmingham Packt Publishing, Limited 2018“…Blockchain technology is giving birth to new business models, inspiring communities to build economies on a decentralized network. This book will be your…”
Get full text
eBook -
17
Revisiting the ichthyodiversity of Java and Bali through DNA barcodes: taxonomic coverage, identification accuracy, cryptic diversity and identification of exotic species
ISSN: 1755-098X, 1755-0998, 1755-0998Published: England Wiley Subscription Services, Inc 01.03.2017Published in Molecular ecology resources (01.03.2017)“… This study provides a DNA barcode reference library for the inland fishes of Java and Bali with the aim to streamline the inventory of fishes in this part of Sundaland…”
Get full text
Journal Article -
18
Ethereum Projects for Beginners: Build Blockchain-Based Cryptocurrencies, Smart Contracts, and DApps
ISBN: 9781789537406, 1789537401Published: Birmingham Packt Publishing, Limited 2018“…Ethereum enables the development of efficient, smart contracts that contain code…”
Get full text
eBook -
19
Performance Analysis and Comparison of Node.Js and Java Spring Boot in Implementation of Restful Applications
ISSN: 0038-0644, 1097-024XPublished: Hoboken, USA John Wiley & Sons, Inc 01.07.2025Published in Software, practice & experience (01.07.2025)“… Objectives The main objective of this work is to check and compare the performance between Node.js and Java Spring Boot, in the context of implementing RESTful applications. REST…”
Get full text
Journal Article -
20
An approach to analyze software security requirements in ABAC model
Published: IEEE 01.12.2019Published in 2019 6th NAFOSTED Conference on Information and Computer Science (NICS) (01.12.2019)“… In this paper, we introduce an approach for checking ABAC rules from the source code of an application software against to its requirement specification…”
Get full text
Conference Proceeding

