• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 6,318
Next 10 →

Distributed Java Object System

by Zack Ives Amit, Amit Aggarwal, Jonathan Aldrich, Miguel Figueroa
"... The Distributed Java Object System adds advanced naming, persistence, security, mobility, and load balancing features to Java's basic RMI communications package. Security is provided through a combination of capabilities [Dennis and Van Horn 1966] and ACLs [Saltzer 1974] that combines some of ..."
Abstract - Add to MetaCart
The Distributed Java Object System adds advanced naming, persistence, security, mobility, and load balancing features to Java's basic RMI communications package. Security is provided through a combination of capabilities [Dennis and Van Horn 1966] and ACLs [Saltzer 1974] that combines some

JOXM: Java Object — XML Mapping

by Adam Dukovich, Jimmy Hua, Jong Seo Lee, Michael Huffman, Alex Dekhtyar
"... Java Object XML Mapping (JOXM) is a library that supports the automated persistence and querying of Java objects in a native XML database. The goal of this library is to provide a suitable alternative to standard object-relational mapping (ORM) tools, most notably Hibernate [3]. Unlike techniques su ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Java Object XML Mapping (JOXM) is a library that supports the automated persistence and querying of Java objects in a native XML database. The goal of this library is to provide a suitable alternative to standard object-relational mapping (ORM) tools, most notably Hibernate [3]. Unlike techniques

Mutation of Java Objects

by Roger T. Alexander, James M. Bieman, Sudipto Ghosh, Bixia Ji , 2002
"... Fault insertion based techniques have been used for measuring test adequacy and testability of programs. Mutation analysis inserts faults into a program with the goal of creating mutation-adequate test sets that distinguish the mutant from the original program. Software testability is measured by ca ..."
Abstract - Cited by 12 (0 self) - Add to MetaCart
Fault insertion based techniques have been used for measuring test adequacy and testability of programs. Mutation analysis inserts faults into a program with the goal of creating mutation-adequate test sets that distinguish the mutant from the original program. Software testability is measured by calculating the probability that a program will fail on the next test input coming from a predefined input distribution, given that the software includes a fault. Inserted faults must represent plausible errors. It is relatively

Mobile Java Objects

by R. J. Hayton, M. H. Bursell, D. I. Donaldson, A. J. Herbert - In Middleware’98 [17 , 1998
"... In this paper we discuss the engineering requirements for adding object mobility to the Java programming language, and give an overview of the design and implementation of our mobile object system. We show that it is helpful to cluster objects for mobility, and that if these clusters represent untru ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
In this paper we discuss the engineering requirements for adding object mobility to the Java programming language, and give an overview of the design and implementation of our mobile object system. We show that it is helpful to cluster objects for mobility, and that if these clusters represent

Mutation of Java Objects

by Roger T. Alex, James M. Bieman, Sudipto Ghosh, Bixia Ji
"... Fault insertion based techniques have been used for measuring test adequacy and testability of programs. Mutation analysis inserts faults into a program with the goal of creating mutation-adequate test sets that distinguish the mutant from the original program. Software testability is measured by ca ..."
Abstract - Add to MetaCart
. We propose a new object mutation approach along with a set of mutation operators and support tools for inserting faults into objects that instantiate items from common Java libraries heavily used in commercial software as well as user defined classes. Preliminary evaluation of our technique shows

Java objects without the header

by Kris Venstermans, Lieven Eeckhout, De Bosschere
"... Abstract—By a recent trend, 64-bit machines are invading the end-user market. One major rumor keeps people from switching over: a 64-bit machine uses more memory then its 32-bit counterpart for the same job. For a 64-bit Virtual Machine, we tackle 2 reasons that nurish this rumor. For a given applic ..."
Abstract - Add to MetaCart
no longer uniformly accessible for all objects. The extra overhead to obtain this information is won back again for most benchmarks by the better memory layout in the heap. As a result we obtain applications that run equally fast, but allocate less memory. Keywords—Java, memory management, 64-bit, Implicit

Abstract Prefetching Java Objects

by Brad Beckmann, Xidong Wang
"... (To be completed when the results section is complete) ..."
Abstract - Add to MetaCart
(To be completed when the results section is complete)

Signing, Sealing, and Guarding Java Objects

by Li Gong, Roland Schemers , 1998
"... Many secure applications are emerging using the Java TM language and running on the Java platform. In dealing with Java security issues, especially when building secure mobile agents on the Java platform, we inevitably depend on the underlying object orientation, such as data encapsulation and typ ..."
Abstract - Cited by 9 (0 self) - Add to MetaCart
Many secure applications are emerging using the Java TM language and running on the Java platform. In dealing with Java security issues, especially when building secure mobile agents on the Java platform, we inevitably depend on the underlying object orientation, such as data encapsulation

Parameterized models for distributed java objects

by Tomás Barros, Rabéa Boulifa, Eric Madelaine - In Forte’04 conference, Madrid, 2004. LNCS 3235, Spinger Verlag , 2004
"... Abstract. Distributed Java applications use remote method invocation as a communication means between distributed objects. The ProActive library provides high level primitives and strong semantic guarantees for programming Java applications with distributed, mobile, secured components. We present a ..."
Abstract - Cited by 20 (9 self) - Add to MetaCart
Abstract. Distributed Java applications use remote method invocation as a communication means between distributed objects. The ProActive library provides high level primitives and strong semantic guarantees for programming Java applications with distributed, mobile, secured components. We present a

A Technique for Mutation of Java Objects

by James M. Bieman, Sudipto Ghosh, Roger T. Alexander - In Proc. Automated Softw. Eng , 2001
"... Mutation analysis inserts faults into a program to create test sets that distinguish the mutant from the original program. Inserted faults must represent plausible errors. Standard transformations can mutate scalar values such as integers, floats, and character data. Mutating objects is an open prob ..."
Abstract - Cited by 18 (2 self) - Add to MetaCart
problem, because object semantics are defined by the programmer and can vary widely. We develop mutation operators and support tools that can mutate Java library items that are heavily used in commercial software. Our mutation engine can support reusable libraries of mutation components to inject faults
Next 10 →
Results 1 - 10 of 6,318
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University