Results 81 to 90 of about 14,055 (238)
A Blockchain Approach to Extract Design Patterns From Source Codes
Design patterns are an effective technique for software development. However, lacking suitable documents often reduces traceability, and advantages remain unclear in source lines of code (SLOC). Design patterns are proven, reliable solutions to several frequent problems in object‐oriented software design.
Shahla Rezaei +4 more
wiley +1 more source
Opportunities for a Truffle-based Golo Interpreter [PDF]
Golo is a simple dynamically-typed language for the Java Virtual Machine. Initially implemented as a ahead-of-time compiler to JVM bytecode, it leverages invokedy-namic and JSR 292 method handles to implement a reasonably efficient runtime.
Loiseau, Yannick +3 more
core +2 more sources
Reify Your Collection Queries for Modularity and Speed! [PDF]
Modularity and efficiency are often contradicting requirements, such that programers have to trade one for the other. We analyze this dilemma in the context of programs operating on collections.
Eichberg, Michael +5 more
core +1 more source
Highly Precise and Efficient Analysis of PendingIntent Vulnerabilities for Android Apps
The expanding development of android applications is partially due to the communication model, named inter‐component communication (ICC) model. PendingIntent (PI) is a powerful feature that is used for ICC. Many android developers use PI in their apps, but if it is used insecurely, it can pose risks and result in different types of attacks like denial ...
Azadeh Sarvazimi +3 more
wiley +1 more source
MAJOR: AN ASPECT WEAVER WITH FULL COVERAGE SUPPORT
Prevailing Aspect-Oriented Programming (AOP) frameworks for Java, such as AspectJ, use bytecode instrumentation techniques to weave aspects into application code. Unfortunately, those frameworks do not support weaving in the Java class library.
Alex Villazón +2 more
doaj
Using dynamic analysis of Java bytecode for evolutionary object-oriented unit testing [PDF]
The focus of this paper is on presenting a methodology for generating and optimizing test data by employing evolutionary search techniques, with basis on the information provided by the analysis and interpretation of Java bytecode and on the dynamic ...
Fernandéz de Vega, Francisco +2 more
core
A Programming Logic for Java Bytecode Programs [PDF]
Using the Isabelle theorem prover [10] we have developed a programming logic for Java bytecode, and demonstrated that it can be used to prove properties of simple bytecode programs involving loops. Our motivation for this was to produce a method by which Java Just-In-Time (JIT) compilers could be assisted to produce more efficient code.
openaire +2 more sources
Smart contracts have the ability to address a variety of important obstacles in the construction business, such as contract conflicts and payment issues. Likewise, it may facilitate the adoption of building information modeling (BIM) in the industry. Poor adoption of distributed ledger technology in the Arabian construction sector stems from a variety ...
Ghasan Alfalah +6 more
wiley +1 more source
ATBShellFinder: A Bytecode-Level Webshell Detector Based on Adversarial Training
Webshell is a malicious server-side script that attackers can upload to a server to execute commands, steal sensitive data, and maintain persistent access.
Yuqin Xie +3 more
doaj +1 more source
Juice: An SVG Rendering Peer for Java Swing [PDF]
SVG—a W3C XML standard—is a relatively new language for describing low-level vector drawings. Due to its cross-platform capabilities and support for events, SVG may potentially be used in interactive GUIs/graphical front-ends.
Yuwono, Ignatius
core +1 more source

