Results 291 to 300 of about 519,644 (350)
Some of the next articles are maybe not open access.

Houdini, an Annotation Assistant for ESC/Java

FME, 2001
A static program checker that performs modular checking can check one program module for errors without needing to analyze the entire program. Modular checking requires that each module be accompanied by annotations that specify the module. To help reduce the cost of writing specifications, this paper presents Houdini, an annotation assistant for the ...
Cormac Flanagan, K. Rustan M. Leino
openaire   +2 more sources

Verifiable annotations for embedded java environments

open access: closedProceedings of the 2005 international conference on Compilers, architectures and synthesis for embedded systems, 2005
Many implementations of Java Virtual Machine (JVM) use optimizing dynamic compilation for improving performance of Java applications. However, optimizing compilation is expensive in terms of both time and memory space complexity. Annotations are frequently used to reduce the dynamic compilation overhead in embedded Java environments where the memory ...
Guangyu Chen, Mahmut Kandemir
openalex   +2 more sources

DeepAnna: Deep Learning based Java Annotation Recommendation and Misuse Detection

IEEE International Conference on Software Analysis, Evolution, and Reengineering, 2022
Annotations have been widely used in Java programs to support additional compile-time, deployment-time, and runtime processing. Developers use annotations to delegate repetitive logics such as object initialization and request forwarding to compilers and
Yi Liu   +5 more
semanticscholar   +1 more source

An annotation-aware Java virtual machine implementation

Concurrency: Practice and Experience, 2000
Ana Azevedo, Alex Nicolau, Joe Hummel
semanticscholar   +3 more sources

Automatic Annotation of Confidential Data in Java Code [PDF]

open access: possible, 2022
The problem of confidential information leak can be addressed by using automatic tools that take a set of annotated inputs\ud (the source) and track their flow to public sinks. Unfortunately, manually annotating the code with labels specifying the secret sources is one of the main obstacles in the adoption of such trackers.\ud In this work, we present ...
Bastys, Iulia   +3 more
openaire   +1 more source

Studying Test Annotation Maintenance in the Wild

International Conference on Software Engineering, 2021
Since the introduction of annotations in Java 5, the majority of testing frameworks, such as JUnit, TestNG, and Mockito, have adopted annotations in their core design.
Dong Jae Kim   +3 more
semanticscholar   +1 more source

Mining Annotation Usage Rules: A Case Study with MicroProfile

IEEE International Conference on Software Maintenance and Evolution, 2022
While Application Programming Interfaces (APIs) allow easier reuse of existing functionality, developers might make mistakes in using these APIs (a.k.a. API misuses). If an API usage specification exists, then automatically detecting such misuses becomes
Batyr Nuryyev   +5 more
semanticscholar   +1 more source

@Java

Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
The ability to annotate code and, in general, the capability to attach arbitrary metadata to portions of a program are features that have become more and more common in programming languages. In fact, various programming techniques and tools exploit their explicit availability for a number of purposes, such as extracting documentation, guiding code ...
W. Cazzola, E. Vacchi
openaire   +1 more source

ANSWER: Annotation Software for Electronic Reporting

JCO Clinical Cancer Informatics, 2022
PURPOSE To better use genetic testing, which is used by clinicians to explain the molecular mechanism of disease and to suggest clinical actionability and new treatment options, clinical next-generation sequencing (NGS) laboratories must send the results
Chelsea K Raulerson   +7 more
semanticscholar   +1 more source

Interactive Back-annotation of Worst-case Execution Time Analysis for Java Microprocessors

open access: closedIEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2007
Trevor Harmon, Raymond Klefstad
openalex   +2 more sources

Home - About - Disclaimer - Privacy