Sciweavers

160 search results - page 4 / 32
» Software Manipulation with Annotations in Java
Sort
View
SACMAT
2010
ACM
14 years 1 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
ICWSM
2009
13 years 6 months ago
Gephi: An Open Source Software for Exploring and Manipulating Networks
Gephi is an open source software for graph and network analysis. It uses a 3D render engine to display large networks in real-time and to speed up the exploration. A flexible and ...
Mathieu Bastian, Sebastien Heymann, Mathieu Jacomy
CSMR
2010
IEEE
13 years 3 months ago
Co-evolving Annotations and Source Code through Smart Annotations
Annotations are a means to attach additional meta data to the source code of a system. Nowadays, more and more technologies rely on the presence of such annotations in the source c...
Andy Kellens, Carlos Noguera, Kris De Schutter, Co...
ISSTA
2012
ACM
11 years 11 months ago
Cooperative types for controlling thread interference in Java
Multithreaded programs are notoriously prone to unintended interference between concurrent threads. To address this problem, we argue that yield annotations in the source code sho...
Jaeheon Yi, Tim Disney, Stephen N. Freund, Cormac ...
CSCW
2008
ACM
13 years 10 months ago
Pushing relevant artifact annotations in collaborative software development
Recent techniques show the benefits of attaching communitygenerated knowledge to artifacts in an information space and presenting it to subsequent readers. We argue that such know...
Uri Dekel, James D. Herbsleb