Sciweavers

207 search results - page 21 / 42
» Documenting Pattern Use in Java Programs
Sort
View
SIGSOFT
2009
ACM
14 years 2 months ago
Graph-based mining of multiple object usage patterns
The interplay of multiple objects in object-oriented programming often follows specific protocols, for example certain orders of method calls and/or control structure constraints...
Tung Thanh Nguyen, Hoan Anh Nguyen, Nam H. Pham, J...
IFIP
2001
Springer
14 years 14 days ago
Security Documentation
Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing sys...
Lam-for Kwok, Peggy P. K. Fung, Dennis Longley
ASE
2011
12 years 11 months ago
Alattin: mining alternative patterns for defect detection
Abstract To improve software quality, static or dynamic defect-detection tools accept programming rules as input and detect their violations in software as defects. As these progra...
Suresh Thummalapenta, Tao Xie
ASIAN
2004
Springer
150views Algorithms» more  ASIAN 2004»
14 years 1 months ago
Concurrent Constraint-Based Memory Machines: A Framework for Java Memory Models
A central problem in extending the von Neumann architecture to petaflop computers with millions of hardware threads and with a shared memory is defining the memory model [Lam79,...
Vijay A. Saraswat
XSYM
2005
Springer
107views Database» more  XSYM 2005»
14 years 1 months ago
Logic Wrappers and XSLT Transformations for Tuples Extraction from HTML
Abstract. Recently it was shown that existing general-purpose inductive logic programming systems are useful for learning wrappers (known as L-wrappers) to extract data from HTML d...
Costin Badica, Amelia Badica