Sciweavers

769 search results - page 74 / 154
» The Real-Time Specification for Java
Sort
View
ACSC
2009
IEEE
14 years 4 months ago
Improving the Transparency of Proxy Injection in Java
Due to their flexibility, proxies have been used for various purposes in standalone and distributed applications. More specifically, object-level proxies support fine grained capa...
Hendrik Gani, Caspar Ryan
HICSS
2005
IEEE
121views Biometrics» more  HICSS 2005»
14 years 3 months ago
Java Architectures for Mobilised Enterprise Systems
The coming generation of mobile phones will enable objects from enterprise systems to be distributed across a range of devices of different scales. This object mobility will provi...
David Parsons
COOTS
1998
13 years 11 months ago
Java Transactions for the Internet
The Web frequently suffers from failures which affect the performance and consistency of applications run over it. An important fault-tolerance technique is the use of atomic tran...
Mark C. Little, Santosh K. Shrivastava
USS
2008
13 years 12 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam
COMPSAC
2007
IEEE
14 years 4 months ago
A Combined Concept Location Method for Java Programs
Concept location is one of the fundamental activities during software maintenance which locates the parts of the source code where a specific concept is implemented. The methods f...
Dapeng Liu, Shaochun Xu