Sciweavers

264 search results - page 37 / 53
» Ephemeral Java Source Code
Sort
View
ACMSE
2005
ACM
13 years 10 months ago
Generative approaches for application tailoring of mobile devices
The popularity of mobile devices has propelled the development of many useful location-aware applications. However, the heterogeneity of mobile devices necessitates that the softw...
Victoria Davis, Jeff Gray, Joel Jones
ESOP
2005
Springer
14 years 2 months ago
Asserting Bytecode Safety
Abstract. We instantiate an Isabelle/HOL framework for proof carrying code to Jinja bytecode, a downsized variant of Java bytecode featuring objects, inheritance, method calls and ...
Martin Wildmoser, Tobias Nipkow
POPL
2001
ACM
14 years 9 months ago
Avoiding exponential explosion: generating compact verification conditions
Current verification condition (VC) generation algorithms, such as weakest preconditions, yield a VC whose size may be exponential in the size of the code fragment being checked. ...
Cormac Flanagan, James B. Saxe
CSMR
2007
IEEE
14 years 3 months ago
An approach for mining services in database oriented applications
The diffusion of service oriented architectures is slowed down by the lack of enough services available for satisfying service integrator needs. Nevertheless, many features desire...
Concettina Del Grosso, Massimiliano Di Penta, Igna...
ACSC
2006
IEEE
14 years 2 months ago
Identifying refactoring opportunities by identifying dependency cycles
The purpose of refactoring is to improve the quality of a software system by changing its internal design so that it is easier to understand or modify, or less prone to errors and...
Hayden Melton, Ewan D. Tempero