Sciweavers

OOPSLA
2000
Springer
13 years 11 months ago
Sealed calls in Java packages
Ayal Zaks, Vitaly Feldman, Nava Aizikowitz
OOPSLA
2000
Springer
13 years 11 months ago
Scalable propagation-based call graph construction algorithms
Propagation-based call graph construction algorithms have been studied intensively in the 1990s, and differ primarily in the number of sets that are used to approximate run-time v...
Frank Tip, Jens Palsberg
OOPSLA
2000
Springer
13 years 11 months ago
Practical virtual method call resolution for Java
Vijay Sundaresan, Laurie J. Hendren, Chrislain Raz...
OOPSLA
2000
Springer
13 years 11 months ago
Exclusion for composite objects
James Noble, David Holmes, John Potter
OOPSLA
2000
Springer
13 years 11 months ago
Improving the Java memory model using CRF
Jan-Willem Maessen, Arvind, Xiaowei Shen
OOPSLA
2000
Springer
13 years 11 months ago
A real world object modeling method for creating simulation environment of real-time systems
Most real-time embedded control software feature complex interactions with asynchronous inputs and environment objects, and a meaningful simulation of a real-time control software...
Ji Y. Lee, Hye J. Kim, Kyo Chul Kang
OOPSLA
2000
Springer
13 years 11 months ago
An efficient class and object encoding
An object encoding translates a language with object primitives to one without. Similarly, a class encoding translates classes into other primitives. Both are important theoretica...
Neal Glew
OOPSLA
2000
Springer
13 years 11 months ago
Finding refactorings via change metrics
Reverse engineering is the process of uncovering the design and the design rationale from a functioning software system. Reverse engineering is an integral part of any successful ...
Serge Demeyer, Stéphane Ducasse, Oscar Nier...