Sciweavers

832 search results - page 74 / 167
» Mutation of Java Objects
Sort
View
ICST
2009
IEEE
14 years 4 months ago
Transforming and Selecting Functional Test Cases for Security Policy Testing
In this paper, we consider typical applications in which the business logic is separated from the access control logic, implemented in an independent component, called the Policy ...
Tejeddine Mouelhi, Yves Le Traon, Benoit Baudry
IWMM
2010
Springer
137views Hardware» more  IWMM 2010»
14 years 1 months ago
The locality of concurrent write barriers
Concurrent and incremental collectors require barriers to ensure correct synchronisation between mutator and collector. The overheads imposed by particular barriers on particular ...
Laurence Hellyer, Richard Jones, Antony L. Hosking
SCP
2002
119views more  SCP 2002»
13 years 9 months ago
Polymorphic subtyping in O'Haskell
O'Haskell is a programming language derived from Haskell by the addition of concurrent reactive objects and subtyping. Because Haskell already encompasses an advanced type sy...
Johan Nordlander
FSEN
2009
Springer
14 years 4 months ago
The Interplay between Relationships, Roles and Objects
In this paper we study the interconnection between relationships and roles. We start from the patterns used to introduce relationships in object oriented languages. We show how th...
Matteo Baldoni, Guido Boella, Leendert van der Tor...
IDMS
1998
Springer
122views Multimedia» more  IDMS 1998»
14 years 2 months ago
Object Graphs as Pivotal Representations for Hypermedia
This position paper advocates a possible bridging of multiple heterogeneous formats and interfaces for hypermedia data and metadata. Rather than one more text, bit-stream or proced...
Marc Brelot, Gilles Privat