Sciweavers

SCAM
2005
IEEE
14 years 5 months ago
A Fast Analysis for Thread-Local Garbage Collection with Dynamic Class Loading
Long-running, heavily multi-threaded, Java server applications make stringent demands of garbage collector (GC) performance. Synchronisation of all application threads before garb...
Richard E. Jones, Andy C. King
SCAM
2005
IEEE
14 years 5 months ago
Transforming Embedded Java Code into Custom Tags
When a new technology is introduced, the migration of existing applications to the new technology must be carefully considered. Automation can make some migrations feasible that o...
Shannon Xu, Thomas R. Dean
SCAM
2005
IEEE
14 years 5 months ago
Fine-Grained Analysis of Change Couplings
In software evolution analysis, many approaches analyze release history data available through versioning systems. The recent investigations of CVS data have shown that commonly c...
Beat Fluri, Harald Gall, Martin Pinzger
SCAM
2005
IEEE
14 years 5 months ago
Measuring the Impact of Friends on the Internal Attributes of Software Systems
Differing views have been expressed on the appropriateness of the friend construct in the design and implementation of object-oriented software in C++. However, little empirical a...
Michael English, Jim Buckley, Tony Cahill, Kristia...
SCAM
2005
IEEE
14 years 5 months ago
Object-oriented cohesion as a surrogate of software comprehension: an empirical study
The concept of software cohesion in both the procedural and object-oriented paradigm is well known and documented. What is not so well known or documented is the perception of wha...
Steve Counsell, Stephen Swift, Allan Tucker
SCAM
2005
IEEE
14 years 5 months ago
Dynamic Slicing of Java Bytecode Programs
Attila Szegedi, Tibor Gyimóthy
SCAM
2005
IEEE
14 years 5 months ago
Pointer Analysis for Source-to-Source Transformations
We present a pointer analysis algorithm designed for source-to-source transformations. Existing techniques for pointer analysis apply a collection of inference rules to a dismantl...
Marcio Buss, Stephen A. Edwards, Bin Yao, Dan G. W...
SCAM
2005
IEEE
14 years 5 months ago
Static Analysis for Computing Escapability and Mutability for Java Components
A common theme in information security is protection of trusted software components against unauthorized access by untrusted users. In the context of distributed object technologi...
Aiwu Shi, Gleb Naumovich
SCAM
2005
IEEE
14 years 5 months ago
Control Flow Graph Reconstruction for Assembly Language Programs with Delayed Instructions
Most software for embedded systems, including digital signal processing systems, is coded in assembly language. For both understanding the software and for reverse compiling it to...
Nerina Bermudo, Andreas Krall, R. Nigel Horspool