Sciweavers

OOPSLA
2000
Springer
14 years 3 months ago
Sealed calls in Java packages
Ayal Zaks, Vitaly Feldman, Nava Aizikowitz
OOPSLA
2000
Springer
14 years 3 months ago
Scalable propagation-based call graph construction algorithms
Propagation-based call graph construction algorithms have been studied intensively in the 1990s, and differ primarily in the number of sets that are used to approximate run-time v...
Frank Tip, Jens Palsberg
OOPSLA
2000
Springer
14 years 3 months ago
Practical virtual method call resolution for Java
Vijay Sundaresan, Laurie J. Hendren, Chrislain Raz...
OOPSLA
2000
Springer
14 years 3 months ago
Exclusion for composite objects
James Noble, David Holmes, John Potter
OOPSLA
2000
Springer
14 years 3 months ago
Improving the Java memory model using CRF
Jan-Willem Maessen, Arvind, Xiaowei Shen
OOPSLA
2000
Springer
14 years 3 months ago
A real world object modeling method for creating simulation environment of real-time systems
Most real-time embedded control software feature complex interactions with asynchronous inputs and environment objects, and a meaningful simulation of a real-time control software...
Ji Y. Lee, Hye J. Kim, Kyo Chul Kang
OOPSLA
2000
Springer
14 years 3 months ago
An efficient class and object encoding
An object encoding translates a language with object primitives to one without. Similarly, a class encoding translates classes into other primitives. Both are important theoretica...
Neal Glew
OOPSLA
2000
Springer
14 years 3 months ago
Finding refactorings via change metrics
Reverse engineering is the process of uncovering the design and the design rationale from a functioning software system. Reverse engineering is an integral part of any successful ...
Serge Demeyer, Stéphane Ducasse, Oscar Nier...