As the demand for software is increasing more rapidly than ever, demand for educating novice programmers are increasing in order to increase the population of programmers to cope with this issue. We developed an autom...
详细信息
ISBN:
(纸本)9780889867864
As the demand for software is increasing more rapidly than ever, demand for educating novice programmers are increasing in order to increase the population of programmers to cope with this issue. We developed an automatic visualization tool "Avis" that generates a flowchart and execution paths from source codes of a java programs for supporting programming education. This paper describes extension of Avis for generating sequence diagrams together with the evaluation of practical use in education to aids novice programmers to understand source code of programs.
Method names in java are natural language phrases describing behaviour, encoded to make them easy for machines to parse. Programmers rely on the meaning encoded in method names to understand code. We know little about...
详细信息
ISBN:
(纸本)9783642004339
Method names in java are natural language phrases describing behaviour, encoded to make them easy for machines to parse. Programmers rely on the meaning encoded in method names to understand code. We know little about the language used in this encoding, its rules and structure, leaving the programmer without guidance in expressing her intent. Yet the meaning of the method names - or phrases - is readily available in the body of the methods they name. By correlating names and implementations, we can figure out the meaning of the original phrases, and uncover the rules of the phrase language as well. In this paper, we present an automatically generated proof-of-concept phrase book for java, based on a large software corpus. The phrase book captures both the grammatical structure and the meaning of method phrases as commonly used by java programmers.
Nowadays the use of the IEC 61131-3 standard is well spread and the number of tool vendors that announce to be IEC 61131-3 standard compliant is increasing. The next step deals with the establishment of design methodo...
详细信息
With the process of adaptation and redefinition of java Remote Method Invocation for J2ME (java 2, Micro Edition) environments, a reduced version of the Remote Method Invocation (RMI) came up. In this reduced version,...
详细信息
With the process of adaptation and redefinition of java Remote Method Invocation for J2ME (java 2, Micro Edition) environments, a reduced version of the Remote Method Invocation (RMI) came up. In this reduced version, called RMIOP, some heavy features such as multiplexing facility or its capacity to go through firewalls offered by the wire protocol, called java Remote Method Protocol (JRMP), have been eliminated. In the present article it is explored how the recovery of the multiplexing facilities of JRMP, rejected during the RMIOP definition, can be carried out maintaining the J2ME idiosyncrasy. The article begins showing how to extend the triad of subprotocols already defined (SingleOpProtocol, StreamProtocol and MultiplexProtocol) with a new one (MultiplexConnnectionLessProtocol) equipped with special facilities to multiplex connections. It gives support for fast and light connection connectionless virtual connections generation and recycling. The paper ends with an empirical evaluation of the proposed subprotocols together with the already existing ones, in terms of end-to-end response time and the size of the frames transmitted through the network, showing the goodness of the protocols.
Wildcards are an often confusing part of the java type system: the behaviour of wildcard types is not fully specified by subtyping, due to wildcard capture, and the rules for type checking are often misunderstood. The...
详细信息
ISBN:
(纸本)9781605585406
Wildcards are an often confusing part of the java type system: the behaviour of wildcard types is not fully specified by subtyping, due to wildcard capture, and the rules for type checking are often misunderstood. Their very formulation seems somehow 'different' from the rest of the java type system, which is based on a simple, nominal hierarchy. We investigate subtyping in models for java with and without generics and wildcards. We separate subclassing from subtyping, unify subtyping for class and wildcard types using existential types, and show that java wildcards emerge naturally from the combination of inclusion and parametric polymorphism.
The Complex nature of the relationships present in Object-Oriented system has made it complicated to understand. Inheritance, polymorphism, encapsulation, information hiding, aggregation and association combination ha...
详细信息
ISBN:
(纸本)9780889867901
The Complex nature of the relationships present in Object-Oriented system has made it complicated to understand. Inheritance, polymorphism, encapsulation, information hiding, aggregation and association combination has made maintenance of Object Oriented systems complicated. Maintenance activities often have unfore seen or unexpected effects on the system. These effects can ripple through system components complicating maintenance and testing of the system. Locating the effects of maintenance provides the maintainer with knowledge that assists in debugging and testing modified and affected components. A Comparative Software Maintenance (CSM) methodology has been developed in this study to assist in the maintenance of Object Oriented systems. Using java as a test language, CSM locates potential side effects, ripple effects and other effects of maintenance on class structures, methods, and objects. CSM uses low-level software architecture model to capture the essence of a java system. CSM performs either predictive, pre-modification impact analysis on a java system or postmodification impact analysis on two different versions of the same OO system. An improved impact analysis procedure that determines impact of changes to the component level is presented. The results of impact analysis is applied to determine the component level testing requirements. The CSM methodology is implemented in JFlex, a software tool for OO program maintenance.
In this paper we apply the powerjava model of roles and relationships to a web application programming environment. First we show how the notion of role, as defined in powerjava, combines and automates several aspects...
详细信息
In this paper we apply the powerjava model of roles and relationships to a web application programming environment. First we show how the notion of role, as defined in powerjava, combines and automates several aspects which are important in web application programming, and which are now unrelated and dealt with separately and mostly by hand, and thus prone to errors. Second we show how from the powerjava code a web application can be automatically constructed using Struts and Spring.
We describe BrainIACS, a web-based medical image processing system that permits and facilitates algorithm developers to quickly create extensible user interfaces for their algorithms. Designed to address the challenge...
详细信息
In this paper we apply the power java model of roles and relationships to a web application programming environment. First we show how the notion of role, as defined in powerjava, combines and automates several aspect...
详细信息
In this paper we apply the power java model of roles and relationships to a web application programming environment. First we show how the notion of role, as defined in powerjava, combines and automates several aspects which are important in web application programming, and which are now unrelated and dealt with separately and mostly by hand, and thus prone to errors. Second we show how from the power java code a web application can be automatically constructed using Struts and Spring.
A new approach to attack on obfuscated code is proposed using the join-point model and the bytecode instrument mechanism provided by AOP. All operations are implemented on bytecode level without acquiring the source c...
详细信息
暂无评论