Developing software from reusable libraries lets developers face a security dilemma: Either be efficient and reuse libraries as they are or inspect them, know about their resource usage, but possibly miss deadlines as...
详细信息
ISBN:
(纸本)9783885796466
Developing software from reusable libraries lets developers face a security dilemma: Either be efficient and reuse libraries as they are or inspect them, know about their resource usage, but possibly miss deadlines as reviews are a time consuming process. In this paper, we propose a novel capability inference mechanism for libraries written in java. It uses a coarse-grained capability model for system resources that can be presented to developers. We found that the capability inference agrees by 86.81% on expectations towards capabilities that can be derived from project documentation. Moreover, our approach can find capabilities that cannot be discovered using project documentation. It is thus a helpful tool for developers mitigating the aforementioned dilemma.
Software clones are introduced to source code by copying and slightly modifying code fragments for reuse. Thus, the problem of finding software clones is essentially the detection of strings that partially match. This...
详细信息
Today, everything has gone distributed for so many types o server applications. We have Web servers, applicatio servers, database servers, file servers, and mail servers tha maintain worker queues and thread pools to ...
详细信息
This paper presents the comparatives analysis and simulations of power system stability 500 KV java Bali using methods of Runge Kutta between lower order and higher order. The stability of a system refers to the abili...
详细信息
PKUSUMSUM is a java platform for multilingual document summarization, and it supports multiple languages, integrates 10 automatic summarization methods, and tackles three typical summarization tasks. The summarization...
详细信息
Improving spatial locality has a great impact on improving cache performance by reducing the number of cache misses. Object model optimization is one way to improve the locality of references inside particular objects...
详细信息
Cloud computing allows clients to upload data and computation to untrusted servers, which leads to potential violations to the confidentiality of client data. We propose JCrypt, a static program analysis which transfo...
详细信息
Modern multicore processor architectures and compilers of shared-memory concurrent programminglanguages provide only weak memory consistency guarantees. A memory model specifies which write action can be seen by a re...
详细信息
AutoRand automatically transforms java applications to use SQL keyword randomization to defend against SQL injection vulnerabilities. AutoRand is completely automatic. Unlike previous approaches it requires no manual ...
详细信息
Popular Q&A sites like StackOverflow have collected numerous code snippets. However, many of them do not have complete type information, making them uncompilable and inapplicable to various software engineering ta...
详细信息
暂无评论