Over the years, static taint analysis emerged as the analysis of choice to detect some of the most common web application vulnerabilities, such as SQL injection (SQLi) and cross-site scripting (XSS) [OWA]. Furthermore...
详细信息
In generalization refactoring, preconditions and allowable source code modifications depend on type constraints of the refactored program. Type constraints of parameterized types should be considered when applying the...
详细信息
ISBN:
(纸本)9780769533162
In generalization refactoring, preconditions and allowable source code modifications depend on type constraints of the refactored program. Type constraints of parameterized types should be considered when applying the refactoring to generic programs, otherwise type errors may be brought into the refactored program. Some type constraint rules for java generic programs are presented to verify the preconditions in the refactoring. The type constraints can be solved by traversing a type constraint graph. Based on the type constraint graph, a refactoring algorithm for extract interface is proposed.
The breakneck evolution of modern programminglanguages aggravates the development of deductive verification tools, which struggle to timely and fully support all new language features. To address this challenge, we p...
详细信息
Digital image processing (DIP) is of great importance in validating and guaranteeing parameters that ensure the quality of mass-produced products. [1]. Therefore, this article focused on developing an industrial autom...
详细信息
In managed languages, serialization of objects is typically done in bespoke binary formats such as Protobuf, or markup languages such as XML or JSON. The major limitation of these formats is readability. Human develop...
详细信息
In systems that support garbage collection, a tension exists between collecting garbage too frequently and not collecting garbage frequently enough. Garbage collection that occurs too frequently may introduce unnecess...
详细信息
ISBN:
(纸本)1581133359
In systems that support garbage collection, a tension exists between collecting garbage too frequently and not collecting garbage frequently enough. Garbage collection that occurs too frequently may introduce unnecessary overheads at the rist of not collecting much garbage during each cycle. On the other hand, collecting garbage too infrequently can result in applications that execute with a large amount of virtual memory (i.e., with a large footprint) and suffer from increased execution times die to paging. In this paper, we use a large colleciton of java applications and the highly tuned and widely used Boehm-Demers-Weiser (BDW) conservative mark-and-sweep garbage collector to experimentally examine the extent to which the frequency of garbage collectio impacts an application's execution time, footprint, and pause times. We use these results to devise some guidelines for controlling garbage and heap growth in a conservative garbage collection in order to minimize application execution times. Then we describe new strategies for controlling in order to minimize application execution times.
Each and every aspect of the modern society is affected by the technology. From extensive usage of electronic health records towards advances in engineering and technology, modern healthcare and its delivery methods a...
详细信息
ISBN:
(纸本)9781509037056
Each and every aspect of the modern society is affected by the technology. From extensive usage of electronic health records towards advances in engineering and technology, modern healthcare and its delivery methods are varying at an ever growing rate. A java based real-time data access and monitoring system using Bluetooth module can be helpful for continuous monitoring of patients to keep healthy environment. Along with the record maintenance, it can also serve as a remote monitor for chronic diseases. This proposal can act as a user interface to update data and can serve as backend program. In the front end side, processed real time data/signals communicated with microcontroller can be received successfully via Bluetooth technology [7] to the Bluetooth transceiver. java program will access the data and store it for analysis whenever needed using GUI. In hospitals, health records of the patients are being kept in database which can be accessed from anywhere in the amenity. This not only saves time but it also results in a better coordination and management of the data. The extensive use of technology in maintaining health records digitally has resulted in major savings in costs, as well as improved patients physical condition and safety. It is used to create an application for monitoring certain parameters such as temperature, sound intensity, bio-medical signals, pressure, humidity and more.
With increasing processing power of today's mobile phones, a reasonable employment of Distributed Speech Recognition (DSR) Technology comes into reach. This paper presents the ETSI DSR front-end standards as softw...
详细信息
With increasing processing power of today's mobile phones, a reasonable employment of Distributed Speech Recognition (DSR) Technology comes into reach. This paper presents the ETSI DSR front-end standards as software- based implementations on the two most popular mobile phone platforms: java ME and Symbian. We present performance comparisons between the different front-end standards as well as the execution times on current mobile phones. After showing that real-time feature-extraction on current devices is possible, we furthermore point out hindrances and pitfalls during development and deployment.
Finite-state models are ubiquitous in the study of concurrent systems, especially controllers and servers that operate in a repetitive cycle. In this paper, we show how to extract finite state models from a run of a m...
详细信息
This paper presents NT-java-1.1B1, an open-source specialized code language model built on StarCoderBase-1.1B2, designed for coding tasks in javaprogramming. NT-java-1.1B achieves state-of-the-art performance, surpas...
详细信息
暂无评论