Results 11 to 20 of about 119,317 (330)

Safety-Critical Java for Embedded Systems [PDF]

open access: yes, 2014
Sikkerhedskritiske systemer er realtidssystemer. Hvis sådanne systemer fejler, kan det have alvorlige eller katastrofale konsekvenser, muligvis livsfarlige konsekvenser. Mange sikkerhedskritiske systemer inkorporerer embeddede computere, som bruges til at kontrollere forskellige opgaver.
Rios Rivas, Juan Ricardo
core   +2 more sources

Java Bytecode Compression for Embedded Systems

open access: green, 1998
A program executing on an embedded system or similar environment faces limited memory resources and fixed time constrains. We demonstrate how factorization of common instruction sequences can be automatically applied to Java bytecode programs. Based on a series of experiments, we argue that program size is reduced by 30% on the average, typically with ...
Lars Clausen   +3 more
openalex   +3 more sources

INTERACTION METHOD BETWEEN WEBVIEW OBJECTS IN HYBRID JAVA APPLICATIONS

open access: yesInformatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, 2023
The article deals with method of interaction between JavaScript objects of different web pages in hybrid java applications. To solve this problem, the WebView component is used, its functionality to provide an interface for JavaScript objects, as well ...
Denys Ratov, Oleh Zakhozhai
doaj   +1 more source

ZWT: A new cross-platform graphical interface framework for Java applications

open access: yesSoftwareX, 2020
The Java Programming Language revolutionized the world of software development in the last decades. Thanks to its portability, Java makes it possible to develop software that can run everywhere, in a truly cross-platform computing environment.
Simone Cirani   +4 more
doaj   +1 more source

A Practical Study of Control in Objected-Oriented–Functional–Logic Programming with Paisley [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2017
Paisley is an extensible lightweight embedded domain-specific language for nondeterministic pattern matching in Java. Using simple APIs and programming idioms, it brings the power of functional-logic processing of arbitrary data objects to the Java ...
Baltasar Trancón y Widemann   +1 more
doaj   +1 more source

A data-driven approach to clinical decision support in tinnitus retraining therapy

open access: yesFrontiers in Neuroinformatics, 2022
BackgroundTinnitus, known as “ringing in the ears”, is a widespread and frequently disabling hearing disorder. No pharmacological treatment exists, but clinical management techniques, such as tinnitus retraining therapy (TRT), prove effective in helping ...
Katarzyna A. Tarnowska   +3 more
doaj   +1 more source

Preserving Javanese Language by Translating Traditional Song used in Dieng’s Dreadlock Hair Cutting Tradition to Support Banjarnegara Local Tourism [PDF]

open access: yesE3S Web of Conferences, 2021
Language is served as evidence of human being civilization. Through language, culture is shared. When a language goes extinct after its speakers are gone, a culture is also threatened.
Alysia Ersa   +2 more
doaj   +1 more source

Certifiable Java for Embedded Systems [PDF]

open access: yesProceedings of the 12th International Workshop on Java Technologies for Real-time and Embedded Systems, 2014
The Certifiable Java for Embedded Systems (CJ4ES) project aimed to develop a prototype development environment and platform for safety-critical software for embedded applications. There are three core constituents: A profile of the Java programming language that is tailored for safety-critical applications, a predictable Java processor built with FPGA ...
Schoeberl, Martin   +7 more
openaire   +3 more sources

Application-Driven Customization of an Embedded Java Virtual Machine [PDF]

open access: yes, 2005
Java for embedded devices is today synonym of "embeddable pseudo-Java". In order to limit their memory footprint, the embedded flavors of Java introduce incompatibilities against the standard edition, and break Java's portability rule.
D. Grove   +6 more
core   +5 more sources

Software watermarking scheme with cloud computing constraints

open access: yes网络与信息安全学报, 2016
A non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the ...
Guang SUN   +6 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy