Sciweavers

725 search results - page 53 / 145
» Escape Analysis for Java
Sort
View
SWS
2006
ACM
14 years 2 months ago
Single sign-on for java web start applications using myproxy
Single sign-on is critical for the usability of distributed systems. While there are several authentication mechanisms which support single sign-on (e.g. Kerberos and X.509), it m...
Terry Fleury, Jim Basney, Von Welch
SCAM
2003
IEEE
14 years 2 months ago
Unique Renaming of Java Using Source Transformation
This paper presents a flexible way in which a deisgn model extracted from Java programs can remain unified with the source code. Each entity declaration and reference in the Java ...
Xinping Guo, James R. Cordy, Thomas R. Dean
ECOOP
2001
Springer
14 years 1 months ago
Precise Constraint-Based Type Inference for Java
Abstract. Precise type information is invaluable for analysis and optimization of object-oriented programs. Some forms of polymorphism found in object-oriented languages pose signi...
Tiejun Wang, Scott F. Smith
IASTEDSE
2004
13 years 10 months ago
Mapping UML statecharts to java code
The Unified Modeling Language (UML) statechart diagram is used for modeling the dynamic aspects of systems. The UML statechart diagrams include many concepts that are not present ...
Iftikhar Azim Niaz, Jiro Tanaka
SCP
2008
76views more  SCP 2008»
13 years 8 months ago
Garbage collection: Java application servers' Achilles heel
Java application servers are gaining popularity as a way for businesses to conduct day-to-day operations. While strong emphasis has been placed on how to obtain peak performance, ...
Feng Xian, Witawas Srisa-an, Hong Jiang