Sciweavers

2062 search results - page 27 / 413
» Hardware Objects for Java
Sort
View
SACMAT
2010
ACM
14 years 16 days ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
ER
1998
Springer
123views Database» more  ER 1998»
13 years 12 months ago
From Object Oriented Conceptual Modeling to Automated Programming in Java
The development of Internet commercial applications and corporate Intranets around the world, which uses Java as the de facto standard language, is a significant topic in modern S...
Oscar Pastor, Vicente Pelechano, Emilio Insfr&aacu...
ICSM
2005
IEEE
14 years 1 months ago
Static Analysis of Object References in RMI-Based Java Software
Distributed applications provide numerous advantages related to software performance, reliability, interoperability, and extensibility. This paper focuses on distributed Java prog...
Mariana Sharp, Atanas Rountev
ISORC
2005
IEEE
14 years 1 months ago
Object-Reuse for More Predictable Real-Time Java Behavior
One of the problems with Java for real-time systems is the unpredictable behavior of garbage collection (GC). GC introduces unexpected load and causes undesirable delays for real-...
Jameela Al-Jaroodi, Nader Mohamed
ECOOP
2006
Springer
13 years 11 months ago
Efficient Object Querying for Java
Modern programming languages have little or no support for querying objects and collections. Programmers are forced to hand code such queries using nested loops, which is both cumb...
Darren Willis, David J. Pearce, James Noble