Results 11 to 20 of about 1,204,944 (369)

Secure Coding Practices in Java: Challenges and Vulnerabilities [PDF]

open access: yesInternational Conference on Software Engineering, 2017
The Java platform and its third-party libraries provide useful features to facilitate secure coding. However, misusing them can cost developers time and effort, as well as introduce security vulnerabilities in software. We conducted an empirical study on
Na Meng   +4 more
semanticscholar   +1 more source

Automatic repair of real bugs in java: a large-scale experiment on the defects4j dataset [PDF]

open access: yesEmpirical Software Engineering, 2016
Defects4J is a large, peer-reviewed, structured dataset of real-world Java bugs. Each bug in Defects4J comes with a test suite and at least one failing test case that triggers the bug.
Matias Martinez   +4 more
semanticscholar   +1 more source

Using Java for distributed computing in the Gaia satellite data processing [PDF]

open access: yes, 2011
In recent years Java has matured to a stable easy-to-use language with the flexibility of an interpreter (for reflection etc.) but the performance and type checking of a compiled language.
Hernandez, Jose   +5 more
core   +2 more sources

Sangiran For The Archaeologist A Short Guide For Students

open access: yesBerkala Arkeologi, 1989
To-day the most important locality of Pleistocene hominids in Southeast Asia is Sangiran. This is where Homo erectus fossils come from, to which species the famous Pithecanthropus and Meganthropus belong.
Gert-Jan Bartstra
doaj   +1 more source

A simplified approach for determination of inflection points of flattening filter-free photon beam using in-house developed software and derivation of reference levels

open access: yesJournal of Medical Physics, 2023
Aim: This article aimed to present the salient features of the in-house developed Java program for the determination of inflection point and dosimetric parameters of flattening filter-free (FFF) photon beam. Reference levels for the dosimetric parameters
Smriti Sharma   +7 more
doaj   +1 more source

Provably correct Java implementations of Spi Calculus security protocols specifications [PDF]

open access: yes, 2010
Spi Calculus is an untyped high level modeling language for security protocols, used for formal protocols specification and verification. In this paper, a type system for the Spi Calculus and a translation function are formally defined, in order to ...
Abadi   +16 more
core   +1 more source

Teaching Java [PDF]

open access: yesInternational Journal of Information and Communication Technology Education, 2007
Information systems students in a graduate section and an undergraduate section of an introductory Java graphical user interface course completed the following initial assignments to learn a simple program: (1) automated programmed instruction tutoring, (2) hands-on learning with a lecture, and (3) collaborative peer tutoring.
openaire   +1 more source

Aplikasi Sistem Pakar Pendamping Perawatan Kesehatan Pribadi berbasis Android "Co-Pad" (Companion Pad)

open access: yesEmitor: Jurnal Teknik Elektro, 2018
Kebanyakan orang tidak mengetahui gejala-gejala penyakit yang ada sehingga tidak memperhatikan hal tersebut, dan akan pergi ke dokter bila sudah terasa sangat sangat sakit dan mengganggu aktivitas.
Puji Andrianto, Nurgiyatna Nurgiyatna
doaj   +1 more source

ANALYSIS OF BUBBLE SORT AND INSERTION SORT ALGORITHM ON MEMORY EFFICIENCY USING DATA MINING APPROACH

open access: yesPilar Nusa Mandiri, 2020
Sorting algorithm in the computational process makes it easy for users when the data sorting process because the data is sorted by the process quickly and automatically. In addition to speed in sorting data, memory efficiency must also be considered.
Iqbal Dzulfiqar Iskandar   +5 more
doaj   +1 more source

Editing of Digital Library Metadata Presented as Graphs

open access: yesСовременные информационные технологии и IT-образование, 2022
The report is aimed at improving the software systems of general-purpose graph editors for the needs of object search and administration of the metadata network of the electronic library.
Ilja A. Filimonov
doaj   +1 more source

Home - About - Disclaimer - Privacy