Code mobility can be defined as the capability to dynamically change the bindings between code fragments and the location in which they are executed. The concept of code mobility is not new, but in recent years has be...
详细信息
Code mobility can be defined as the capability to dynamically change the bindings between code fragments and the location in which they are executed. The concept of code mobility is not new, but in recent years has become a hot topic. Web browsers are able to download programs attached to web pages that are executed locally. On the other hand, mobile agent technology allows for agents to autonomously migrate to new hosts. A major concern involved in the use of these technologies is security: the integrity of the receiving host must not be compromised by the execution of mobile code. The local host needs to define a security policy that specifies which resources are made available to mobile code, potentially untrusted. On the other hand, the runtime system must, somehow enforce such policy. In this paper;we present a survey of different techniques aimed at resolving the problem of secure resource management, and argue within which context they are appropriate.
This paper presents java language from an object-oriented software construction perspective. It explains the implications of banning generics and multiple inheritance of classes, and explores the patterns and the idio...
详细信息
This paper presents java language from an object-oriented software construction perspective. It explains the implications of banning generics and multiple inheritance of classes, and explores the patterns and the idioms used by the java designers and programmers to redeem their benefits. The paper also discusses an alternative to multiple inheritance, as incorporated in Lava, which extends java with constructs for type-safe automatic forwarding. (C) 2001 Elsevier Science Ltd. All rights reserved.
When software vulnerabilities threaten the security of users, new research on approaches to reduce security vulnerabilities must be explored. The development of deep learning has opened up the era of automatic code vu...
详细信息
When software vulnerabilities threaten the security of users, new research on approaches to reduce security vulnerabilities must be explored. The development of deep learning has opened up the era of automatic code vulnerability detection, extricated humans from multifarious pattern definition, and feature selection. However, existing deep learning based vulnerability detection schemes are still in their early stage, most of them adopted token-level representing schemes, losing the logical information above token level and resulting in the narrowing of differences between codes. They always had low accuracy and high false positive rate. In addition, it is noticed that most code vulnerability detection methods focused on C/C++, and little work can be found on java. In light of this, we propose an intelligent sentence-level vulnerability self-detection framework (ISVSF), which considers the syntax characteristics of java and adopts sentence-level method representation and pattern exploration. Experimental results demonstrate that the ISVSF outperforms the existing token-level vulnerability detection schemes in terms of accuracy, false positive rate, detection time, etc. In addition, fast and strong vulnerability feature extraction enables ISVSF to learn vulnerability-related features quickly and achieve high accuracy with providing little training samples, thereby reducing the demand for training dataset effectively.
JSetL is a java library that endows java with a number of facilities that are intended to support declarative and constraint (logic) programming. In this paper we show how JSetL can be used to support general forms of...
详细信息
JSetL is a java library that endows java with a number of facilities that are intended to support declarative and constraint (logic) programming. In this paper we show how JSetL can be used to support general forms of nondeterministic programming in an object-oriented framework. This is obtained by combining different but related facilities, such as logical variables, set data structures, unification, along with a constraint solver that allows the user to solve nondeterministic constraints as well as to define new constraints using the nondeterminism handling facilities provided by the solver itself. Thus, the user can define her/his own general nondeterministic procedures as new constraints, letting the constraint solver handle them. The proposed solutions are illustrated through a number of concrete java programs using JSetL, including the implementation of simple Definite Clause Grammars.
Active Learning has become an important area of research owing to the increasing number of real-world problems which contain labelled and unlabelled examples at the same time. JCLAL is a java Class Library for Active ...
详细信息
Active Learning has become an important area of research owing to the increasing number of real-world problems which contain labelled and unlabelled examples at the same time. JCLAL is a java Class Library for Active Learning which has an architecture that follows strong principles of object-oriented design. It is easy to use, and it allows the developers to adapt, modify and extend the framework according to their needs. The library offers a variety of active learning methods that have been proposed in the literature. The software is available under the GPL license.
The system of collaborative competition shows swarm intelligence features through individual co-interactive. Based on the predominance of Multi-Agents Simulation in describing and modeling a complex system, a model of...
详细信息
ISBN:
(纸本)9783642022975
The system of collaborative competition shows swarm intelligence features through individual co-interactive. Based on the predominance of Multi-Agents Simulation in describing and modeling a complex system, a model of the enterprise collaborative competition was built. The model defined every enterprise as an agent and defined agent actions combining Holland's ECHO model. In the model, the mechanism of behaviors and simulation parameters were designed. The dynamic competitive behavior of the enterprises was simulated through java language. Finally the results of the simulation were analyzed.
The 12th edition of the Competition on Software Verification (SV-COMP 2023) is again the largest overview of tools for software verification, evaluating 52 verification systems from 34 teams from 10 countries. Besides...
详细信息
ISBN:
(纸本)9783031308192;9783031308208
The 12th edition of the Competition on Software Verification (SV-COMP 2023) is again the largest overview of tools for software verification, evaluating 52 verification systems from 34 teams from 10 countries. Besides providing an overview of the state of the art in automatic software verification, the goal of the competition is to establish standards, provide a platform for exchange to developers of such tools, educate PhD students on reproducibility approaches and benchmarking, and provide computing resources to developers that do not have access to compute clusters. The competition consisted of 23 805 verification tasks for C programs and 586 verification tasks for java programs. The specifications include reachability, memory safety, overflows, and termination. This year, the competition introduced a new competition track on witness validation, where validators for verification witnesses are evaluated with respect to their quality.
In recent years, students have confronted the importance of developing intermediate level programming skills. Many students are weak not only in programming: they are also not good at cooperation and collaboration whe...
详细信息
ISBN:
(纸本)9783642153921
In recent years, students have confronted the importance of developing intermediate level programming skills. Many students are weak not only in programming: they are also not good at cooperation and collaboration when designing a program. Therefore, we produced a distance-learning support system using java. Generally, students can acquire knowledge that is constant in distance learning, but they find that it is difficult to finish a program independently. In distance learning, it is important to use mutual teaching and regular communication among students. When interesting programming of contents exists, games can make more effectively using java software. This paper presents java programming techniques that are necessary for game programming. Moreover this system supports upper level functions of game programming.
作者:
Chung, Chun-MokSoftware Lab.
Information OBU LG Information and Communications Ltd. Seoul 153-023 South Korea
For a distributed parallel computing platform with multiple computers connected to the Internet, java-Internet Computing Environment (JICB) is designed with multithreading and remote method invocation (RMI) mechanisms...
详细信息
We present Object Equality Profiling (OEP), a new technique for helping programmers discover optimization opportunities in programs. OEP discovers opportunities for replacing a set of equivalent object instances with ...
详细信息
We present Object Equality Profiling (OEP), a new technique for helping programmers discover optimization opportunities in programs. OEP discovers opportunities for replacing a set of equivalent object instances with a single representative object. Such a set represents an opportunity for automatically or manually applying optimizations such as hash consing, heap compression, lazy allocation, object caching, invariant hoisting, and more. To evaluate OEP, we implemented a tool to help programmers reduce the memory usage of java programs. Our tool performs a dynamic analysis that records all the objects created during a particular program run. The tool partitions the objects into equivalence classes, and uses collected timing information to determine when elements of an equivalence class could have been safely collapsed into a single representative object without affecting the behavior of that program run. We report the results of applying this tool to benchmarks, including two widely used Web application servers. Many benchmarks exhibit significant amounts of object equivalence, and in most benchmarks our profiler identifies optimization opportunities clustered around a small number of allocation sites. We present a case study of using our profiler to find simple manual optimizations that reduce the average space used by live objects in two SpecJVM benchmarks by 47% and 38% respectively.
暂无评论