Results 1 - 10
of
6,318
Distributed Java Object System
"... The Distributed Java Object System adds advanced naming, persistence, security, mobility, and load balancing features to Java's basic RMI communications package. Security is provided through a combination of capabilities [Dennis and Van Horn 1966] and ACLs [Saltzer 1974] that combines some of ..."
Abstract
- Add to MetaCart
The Distributed Java Object System adds advanced naming, persistence, security, mobility, and load balancing features to Java's basic RMI communications package. Security is provided through a combination of capabilities [Dennis and Van Horn 1966] and ACLs [Saltzer 1974] that combines some
JOXM: Java Object — XML Mapping
"... Java Object XML Mapping (JOXM) is a library that supports the automated persistence and querying of Java objects in a native XML database. The goal of this library is to provide a suitable alternative to standard object-relational mapping (ORM) tools, most notably Hibernate [3]. Unlike techniques su ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
Java Object XML Mapping (JOXM) is a library that supports the automated persistence and querying of Java objects in a native XML database. The goal of this library is to provide a suitable alternative to standard object-relational mapping (ORM) tools, most notably Hibernate [3]. Unlike techniques
Mutation of Java Objects
, 2002
"... Fault insertion based techniques have been used for measuring test adequacy and testability of programs. Mutation analysis inserts faults into a program with the goal of creating mutation-adequate test sets that distinguish the mutant from the original program. Software testability is measured by ca ..."
Abstract
-
Cited by 12 (0 self)
- Add to MetaCart
Fault insertion based techniques have been used for measuring test adequacy and testability of programs. Mutation analysis inserts faults into a program with the goal of creating mutation-adequate test sets that distinguish the mutant from the original program. Software testability is measured by calculating the probability that a program will fail on the next test input coming from a predefined input distribution, given that the software includes a fault. Inserted faults must represent plausible errors. It is relatively
Mobile Java Objects
- In Middleware’98 [17
, 1998
"... In this paper we discuss the engineering requirements for adding object mobility to the Java programming language, and give an overview of the design and implementation of our mobile object system. We show that it is helpful to cluster objects for mobility, and that if these clusters represent untru ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
In this paper we discuss the engineering requirements for adding object mobility to the Java programming language, and give an overview of the design and implementation of our mobile object system. We show that it is helpful to cluster objects for mobility, and that if these clusters represent
Mutation of Java Objects
"... Fault insertion based techniques have been used for measuring test adequacy and testability of programs. Mutation analysis inserts faults into a program with the goal of creating mutation-adequate test sets that distinguish the mutant from the original program. Software testability is measured by ca ..."
Abstract
- Add to MetaCart
. We propose a new object mutation approach along with a set of mutation operators and support tools for inserting faults into objects that instantiate items from common Java libraries heavily used in commercial software as well as user defined classes. Preliminary evaluation of our technique shows
Java objects without the header
"... Abstract—By a recent trend, 64-bit machines are invading the end-user market. One major rumor keeps people from switching over: a 64-bit machine uses more memory then its 32-bit counterpart for the same job. For a 64-bit Virtual Machine, we tackle 2 reasons that nurish this rumor. For a given applic ..."
Abstract
- Add to MetaCart
no longer uniformly accessible for all objects. The extra overhead to obtain this information is won back again for most benchmarks by the better memory layout in the heap. As a result we obtain applications that run equally fast, but allocate less memory. Keywords—Java, memory management, 64-bit, Implicit
Signing, Sealing, and Guarding Java Objects
, 1998
"... Many secure applications are emerging using the Java TM language and running on the Java platform. In dealing with Java security issues, especially when building secure mobile agents on the Java platform, we inevitably depend on the underlying object orientation, such as data encapsulation and typ ..."
Abstract
-
Cited by 9 (0 self)
- Add to MetaCart
Many secure applications are emerging using the Java TM language and running on the Java platform. In dealing with Java security issues, especially when building secure mobile agents on the Java platform, we inevitably depend on the underlying object orientation, such as data encapsulation
Parameterized models for distributed java objects
- In Forte’04 conference, Madrid, 2004. LNCS 3235, Spinger Verlag
, 2004
"... Abstract. Distributed Java applications use remote method invocation as a communication means between distributed objects. The ProActive library provides high level primitives and strong semantic guarantees for programming Java applications with distributed, mobile, secured components. We present a ..."
Abstract
-
Cited by 20 (9 self)
- Add to MetaCart
Abstract. Distributed Java applications use remote method invocation as a communication means between distributed objects. The ProActive library provides high level primitives and strong semantic guarantees for programming Java applications with distributed, mobile, secured components. We present a
A Technique for Mutation of Java Objects
- In Proc. Automated Softw. Eng
, 2001
"... Mutation analysis inserts faults into a program to create test sets that distinguish the mutant from the original program. Inserted faults must represent plausible errors. Standard transformations can mutate scalar values such as integers, floats, and character data. Mutating objects is an open prob ..."
Abstract
-
Cited by 18 (2 self)
- Add to MetaCart
problem, because object semantics are defined by the programmer and can vary widely. We develop mutation operators and support tools that can mutate Java library items that are heavily used in commercial software. Our mutation engine can support reusable libraries of mutation components to inject faults
Results 1 - 10
of
6,318