Sciweavers

412 search results - page 50 / 83
» Refactoring
Sort
View
WCRE
2006
IEEE
14 years 5 months ago
Mining Control Flow Graphs for Crosscutting Concerns
Aspect mining tries to identify crosscutting concerns in existing systems and thus supports the adaption to an aspect-oriented design. This paper describes an automatic static asp...
Jens Krinke
ECOOP
2005
Springer
14 years 4 months ago
State Based Ownership, Reentrance, and Encapsulation
Abstract. A properly encapsulated data representation can be revised for refactoring or other purposes without affecting the correctness of client programs and extensions of a clas...
Anindya Banerjee, David A. Naumann
ICLP
2010
Springer
14 years 2 months ago
Program analysis for code duplication in logic programs
Abstract. In this PhD project, we deal with the issue of code duplication in logic programs. In particular semantical duplication or redundancy is generally viewed as a possible se...
Celine Dandois
DATE
2004
IEEE
128views Hardware» more  DATE 2004»
14 years 2 months ago
An Assembler Driven Verification Methodology (ADVM)
This paper presents an overview of an assembler driven verification methodology (ADVM) that was created and implemented for a chip card project at Infineon Technologies AG [2]. Th...
John S. MacBeth, Dietmar Heinz, Ken Gray
SERP
2007
14 years 11 days ago
Runtime Support of Speculative Optimization for Offline Escape Analysis
Escape analysis can improve the speed and memory efficiency of garbage collected languages by allocating objects to the call stack, but an offline analysis will potentially interf...
Kevin Cleereman, Michelle Cheatham, Krishnaprasad ...