An effects system can be used to delimit the scope of computational effects within a program. This information is not only useful for the programmer, but also can be used in the definition of a number of optimizations...
详细信息
This paper discusses considerations for input/output for a first course in java. It includes the opinions of several computer science educators regarding the pros and cons of using a non-standard package for input/out...
详细信息
Jini is a java-based network-enabled service architecture that provides plug-n-work capabilities to devices and services in a distributed environment. Jini uses a lookup service, which devices and services can registe...
详细信息
Jini is a java-based network-enabled service architecture that provides plug-n-work capabilities to devices and services in a distributed environment. Jini uses a lookup service, which devices and services can register. When a device plugs in, it goes through an add-in protocol called a discovery and join-in. Jini simplifies the process of adding devices without planning, installation, or human intervention. Current research in the Jini community has been focused on improving security of Jini services. In particular, the current security model provides minimal authentication of clients and services;leaving clients vulnerable during service discovery, service lookup, and malicious service invocation. In addition, clients and services communicate over insecure links. This vulnerability leaves the system open to various attacks. In this paper we address these issues, and propose a secure framework based on SSL, that authenticates services, and transfers information along a secure encrypted path. In particular, we integrate a secure trusted proxy and firewall into the Jini framework without compromising the Jini plug-n-work capabilities.
programming tools continually go through the refinement process due to the realization of lack of robustness that needs softening of some hard nature of features, removing redundant features and adding more suitable f...
详细信息
programming tools continually go through the refinement process due to the realization of lack of robustness that needs softening of some hard nature of features, removing redundant features and adding more suitable features. In the evolution of languages java has emerged as a first class, upgraded and refined language in the line of C and C++ for writing robust programs [1]. It basically claims that it is free of several undesirable features that were causing less reliable and durable programs. Though java was not originally developed for internet applications, its adaptation as web language has incidentally been kept away from fully being utilized in creating robust programs in other sectors of IT industries. java as a refined version of C++ is however found having few inconsistencies with its syntax and semantic aspects. The aim of this communication is to underline some of these inconsistencies that make the programs somewhat obscured. java has definitely a long future and it will soon be adopted as the language of IT industries in near future. Before java becomes a mainstream language its scope for system programming and its robustness property can be improved by paying some attention in reviewing its features.
We describe a complete system for gathering, computing and presenting dynamic metrics from java programs. The system itself was motivated from our real goals in understanding program behaviour as compiler/runtime deve...
详细信息
ISBN:
(纸本)1581137516
We describe a complete system for gathering, computing and presenting dynamic metrics from java programs. The system itself was motivated from our real goals in understanding program behaviour as compiler/runtime developers, and so solves a number of practical and difficult problems related to metric gathering and analysis.
Exceptions are the preferred method for error handling in object-oriented languages like java. Current program-slicing algorithms do not correctly deal with exception-handling constructs, because they do not account f...
详细信息
ISBN:
(纸本)9781581136678
Exceptions are the preferred method for error handling in object-oriented languages like java. Current program-slicing algorithms do not correctly deal with exception-handling constructs, because they do not account for the additional control and data dependences introduced by exceptions. This paper extends previous work on program slicing using the system dependence graph (SDG) to support slicing programs with exceptions.
java RMI by default does not support authenticated and encrypted transport. That is, objects sent over the network are not encrypted. A firewall can be used to secure a java RMI application. Here, the firewall must al...
详细信息
ISBN:
(纸本)0889863806
java RMI by default does not support authenticated and encrypted transport. That is, objects sent over the network are not encrypted. A firewall can be used to secure a java RMI application. Here, the firewall must allow access to specifically known ports. That is, these ports cannot be denied access by the firewall. SOCKS provides a partial solution to the use of RMI through firewalls in that it protects outgoing RMI calls, but incoming RMI calls as well as RMI call-backs are not protected. This may be overcome by using bi-directional RMI implementation through the firewalls. However, it requires the use of specific settings that can relax the security or application-level proxy servers, thus increasing the administrative overheads. Also, changing the security policy to allow bi-directional RMI traffic should only be done with extreme care. A better solution towards securing RMI is by means of supporting authenticated and encrypted transport, so that a network attacker cannot alter data on communication. This can be achieved by running RMI on SSL.
The java programming language supports concurrency. Concurrent programs are hard to test due to their inherent non-determinism. This paper presents a classification of concurrency failures that is based on a model of ...
详细信息
The java Virtual Machine (JVM) is usually implemented by an interpreter or just-in-time (JIT) compiler. JITs provide the best performance, but interpreters have a number of advantages that make them attractive, especi...
详细信息
ISBN:
(纸本)9781581136241
The java Virtual Machine (JVM) is usually implemented by an interpreter or just-in-time (JIT) compiler. JITs provide the best performance, but interpreters have a number of advantages that make them attractive, especially for embedded systems. These advantages include simplicity, portability and low memory requirements. In this paper we describe a new interpreter core for CVM, Sun Microsystem's JVM for connected devices and embedded systems. The interpreter core is portable and programmed in C. An interpreter generator is used to apply a number of optimisations automatically to the source code, Experimental results show that on benchmarks that spend almost all their time in the interpreter (rather than the run time system) it is 28% to 58% faster than the original CVM interpreter, and is only 5% to 9% slower than the highly-sophisticated, hand-tuned, assembly language interpreter in Sun's desktop JVM.
作者:
De Melo, Ana C.V.Moutinho, Bruno M.
Department of Computer Science Cidade Universitária Rua do Matão 1010 05508 900 São Paulo - SP Brazil
Object oriented programminglanguages provide, in principle, mechanisms to enhance code reuse. As an effort of designing object oriented software, design patterns and frameworks are recognised as good techniques for r...
详细信息
Object oriented programminglanguages provide, in principle, mechanisms to enhance code reuse. As an effort of designing object oriented software, design patterns and frameworks are recognised as good techniques for reuse. Frameworks are of particular interest as design and code reuse are achieved. Despite of that, most frameworks were designed to be adapted to applications and not to be composed with other frameworks. As a result, problems such as control-flow composition, legacy components composition, frameworks gap, entities overlap and composition of frameworks behaviour arise. The present work is a study on the composition of java frameworks control-flows, where a third framework is created from two existing ones. With this study we have checked the potential problems that may appear as two control-flows are composed via message passing.
暂无评论