Results 11 to 20 of about 93,814 (300)
A Low-Footprint Class Loading Mechanism for Embedded Java Virtual Machines [PDF]
This paper shows that it is possible to dramatically reduce the memory consumption of classes loaded in an embedded Java virtual machine without reducing its functionalities. We describe how to pack the constant pool by deleting entries which are only used during the class loading process.
Christophe Rippert+2 more
arxiv +3 more sources
The embedded Java benchmark suite JemBench [PDF]
Requirements to embedded systems increase steadily. In parallel, also the performance of the processors used in these systems is improved leading to multithreaded and/or multicore architectures. Depending on the type of the embedded system, using Java is a more and more popular way for software development.
Thomas B. Preußer+2 more
openaire +4 more sources
Java based middleware for embedded systems
Abstract Current tendency in software development of large control systems Icads to products built up from components working in different nodes of a heterogeneous network environment. Particular components becomes an important aspect, since a program composed of components does not guarantee in itself reliable function after the system is extended ...
Ondrej Krejcar+2 more
openaire +3 more sources
INTERACTION METHOD BETWEEN WEBVIEW OBJECTS IN HYBRID JAVA APPLICATIONS
The article deals with method of interaction between JavaScript objects of different web pages in hybrid java applications. To solve this problem, the WebView component is used, its functionality to provide an interface for JavaScript objects, as well ...
Denys Ratov, Oleh Zakhozhai
doaj +1 more source
A Complex Java Code Generator for ACL2 Based on a Shallow Embedding of ACL2 in Java [PDF]
This paper describes a code generator that translates ACL2 constructs to corresponding Java constructs, according to a shallow embedding of ACL2 in Java. Starting from purely functional ACL2 code, the generated Java code exhibits imperative and object-oriented features like destructive updates, loops, and overloading.
arxiv +1 more source
A data-driven approach to clinical decision support in tinnitus retraining therapy
BackgroundTinnitus, known as “ringing in the ears”, is a widespread and frequently disabling hearing disorder. No pharmacological treatment exists, but clinical management techniques, such as tinnitus retraining therapy (TRT), prove effective in helping ...
Katarzyna A. Tarnowska+3 more
doaj +1 more source
Certifiable Java for Embedded Systems [PDF]
The Certifiable Java for Embedded Systems (CJ4ES) project aimed to develop a prototype development environment and platform for safety-critical software for embedded applications. There are three core constituents: A profile of the Java programming language that is tailored for safety-critical applications, a predictable Java processor built with FPGA ...
Schoeberl, Martin+7 more
openaire +4 more sources
Preserving Javanese Language by Translating Traditional Song used in Dieng’s Dreadlock Hair Cutting Tradition to Support Banjarnegara Local Tourism [PDF]
Language is served as evidence of human being civilization. Through language, culture is shared. When a language goes extinct after its speakers are gone, a culture is also threatened.
Alysia Ersa+2 more
doaj +1 more source
Reconfiguration of embedded Java applications [PDF]
This work presents the development of a coarse grain reconfigurable unit to be coupled to a native Java microcontroller, which is designed for an optimized execution of the embedded application. Code fragments to be accelerated through this unit are identified by profiling the application.
Flávio Rech Wagner+2 more
openaire +2 more sources
Software watermarking scheme with cloud computing constraints
A non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the ...
Guang SUN+2 more
doaj +3 more sources