Sciweavers

587 search results - page 94 / 118
» Algorithmic Debugging of Java Programs
Sort
View
VEE
2005
ACM
143views Virtualization» more  VEE 2005»
14 years 3 months ago
Optimized interval splitting in a linear scan register allocator
We present an optimized implementation of the linear scan register allocation algorithm for Sun Microsystems’ Java HotSpotTM client compiler. Linear scan register allocation is ...
Christian Wimmer, Hanspeter Mössenböck
SCAM
2007
IEEE
14 years 4 months ago
Toward an Implementation of the "Form Template Method" Refactoring
This paper presents an implementation of the “form template method” refactoring. This transformation has not been automated yet, but has many similarities with other transform...
Nicolas Juillerat, Béat Hirsbrunner
IH
2005
Springer
14 years 3 months ago
Self-validating Branch-Based Software Watermarking
Software protection is an area of active research in which a variety of techniques have been developed to address the issue. Examples of such techniques are software watermarking, ...
Ginger Myles, Hongxia Jin
TVCG
2012
201views Hardware» more  TVCG 2012»
12 years 14 days ago
Exact and Approximate Area-Proportional Circular Venn and Euler Diagrams
— Scientists conducting microarray and other experiments use circular Venn and Euler diagrams to analyze and illustrate their results. As one solution to this problem, this artic...
Leland Wilkinson
AOSD
2007
ACM
14 years 2 months ago
Efficiently mining crosscutting concerns through random walks
Inspired by our past manual aspect mining experiences, this paper describes a random walk model to approximate how crosscutting concerns can be discovered in the absence of domain...
Charles Zhang, Hans-Arno Jacobsen