Sciweavers

832 search results - page 77 / 167
» Mutation of Java Objects
Sort
View
IASTEDSEA
2004
13 years 11 months ago
An object oriented approach to an identity based encryption cryptosystem
We describe an object oriented approach to developing an Identity Based Encryption system. We show how an existing API was reused and extended to facilitate our development of the...
Adam Duffy, Tom Dowling
WWW
2001
ACM
14 years 10 months ago
Objectifying the Web the Light Way: an RDF-based Framework for the Description of Web Objects
The advantages of object-oriented (OO) programming are well-known. Nevertheless, distributed OO middleware systems (OOM) such as CORBA, DCOM or Java RMI have not been widely adopt...
Pasqualino Assini
ICSE
2007
IEEE-ACM
14 years 10 months ago
Ownership and Immutability Inference for UML-Based Object Access Control
We propose a mechanism for object access control which is based on the UML. Specifically, we propose use of ownership and immutability constraints on UML associations and verifica...
Yin Liu, Ana Milanova
IWPC
1998
IEEE
14 years 2 months ago
Design Pattern Recovery in Object-Oriented Software
An approach to recover object oriented design patterns from design and code is presented. The pattern recovery process is based on a multi-stage filtering strategy to avoid combin...
Giuliano Antoniol, Roberto Fiutem, L. Cristoforett...
MODELLIERUNG
2001
13 years 11 months ago
Applicability of the Object Constraint Language (OCL) in Commercial Software Development for Vehicle Routing and Scheduling Soft
Abstract: Models are important artefacts that support human understanding and communication. Often software development involves specialists from a variety of fields, e.g. mathemat...
Peter Wendorff