Sciweavers

725 search results - page 45 / 145
» Escape Analysis for Java
Sort
View
ISSRE
2002
IEEE
14 years 1 months ago
Mutation of Java Objects
Fault insertion based techniqueshave been used for measuring test adequacy and testability of programs. Mutation analysis inserts faults into a program with the goal of creating m...
Roger T. Alexander, James M. Bieman, Sudipto Ghosh...
SAC
2006
ACM
13 years 8 months ago
powerJava: ontologically founded roles in object oriented programming languages
In this paper we introduce a new view on roles in Object Oriented programming languages, based on an ontological analysis of roles. A role is always associated with an object inst...
Matteo Baldoni, Guido Boella, Leendert W. N. van d...
RTA
2011
Springer
12 years 11 months ago
Modular Termination Proofs of Recursive Java Bytecode Programs by Term Rewriting
In [5, 15] we presented an approach to prove termination of non-recursive Java Bytecode (JBC) programs automatically. Here, JBC programs are first transformed to finite terminat...
Marc Brockschmidt, Carsten Otto, Jürgen Giesl
CTRSA
2005
Springer
210views Cryptology» more  CTRSA 2005»
14 years 2 months ago
Hold Your Sessions: An Attack on Java Session-Id Generation
HTTP session-id’s take an important role in almost any web site today. This paper presents a cryptanalysis of Java Servlet 128-bit session-id’s and an efficient practical predi...
Zvi Gutterman, Dahlia Malkhi
CC
2009
Springer
153views System Software» more  CC 2009»
13 years 6 months ago
From Specification to Optimisation: An Architecture for Optimisation of Java Bytecode
We present the architecture of the Rosser toolkit that allows optimisations to be specified in a domain specific language, then compiled and deployed towards optimising object prog...
Richard Warburton, Sara Kalvala