Spelling suggestions: "subject:"java."" "subject:"lava.""
441 |
AN OBJECT-ORIENTED PC-BASED SYSTEM FOR TSPI COLLECTION AND DISTRIBUTIONPaulick, Mike, Thomas, Tim 10 1900 (has links)
International Telemetering Conference Proceedings / October 22-25, 2001 / Riviera Hotel and Convention Center, Las Vegas, Nevada / The Range Instrumentation and Control System (RICS) is a PC-based client/server application designed to collect time-space position information (TSPI) from remote radar test sites and distribute it in real-time across a wide area network (WAN). The system architecture is composed of two main parts - the Data Interface Adapter (or DIA, which runs under VxWorks and is implemented using C/C++) and the RICS console PC (which runs under Windows 2000 and is implemented in Java). CORBA is used to provide communication between the RICS console and DIA. This paper describes the design of the system, focusing primarily on the DIA software.
|
442 |
Performance modeling and load balancing for Distributed Java Virtual MachineLuo, Yang, 羅陽 January 2008 (has links)
published_or_final_version / Computer Science / Master / Master of Philosophy
|
443 |
Google app engine case study : a micro blogging siteKajita, Marcos Suguru 27 August 2010 (has links)
Cloud computing refers to the combination of large scale hardware resources at datacenters integrated by system software that provides services, commonly known as Software-as-a-Service (SaaS), over the Internet. As a result of more affordable datacenters, cloud computing is slowly making its way into the mainstream business arena and has the potential to revolutionize the IT industry. As more cloud computing solutions become available, it is expected that there will be a shift to what is sometimes referred to as the Web Operating System. The Web Operating System, along with the sense of infinite computing resources on the “cloud” has the potential to bring new challenges in software engineering. The motivation of this report, which is divided into two parts, is to understand these challenges. The first part gives a brief introduction and analysis of cloud computing. The second part focuses on Google’s cloud computing platform and evaluates the implementation of a micro blogging site using Google’s App Engine. / text
|
444 |
Resource management in open tuple space systemsMenezes, Ronaldo Parente de January 1999 (has links)
No description available.
|
445 |
An empirical investigation of inheritance trends in Java OSS evolutionNasseri, Emal January 2009 (has links)
Inheritance is a salient feature of Object-Oriented (OO) paradigm which facilitates reuse and improves system comprehensibility in OO systems. The overall aim of inheritance is to model classes in a structured hierarchy where classes residing lower in the hierarchy (subclasses) can inherit the pre-existing functionality in the classes located higher up (superclasses) in the same line of hierarchy. Software maintenance and evolution are the process of making any modifications to a software system and upgrading its dynamic behaviour. In this Thesis, we empirically investigate the trends of evolution of eight Java Open-Source Systems (OSS) from an inheritance perspective and model the propensity for changes of inheritance in those systems. The systems used as testbed in this Thesis represent a variety of application domains with varying sizes and amount of inheritance employed. There are several levels of granularity for inheritance evolution that may manifest a particular trend. This starts from the highest level (package) to lower class, method an attribute levels; and each level may show a different and yet an important pattern of evolution. We empirically investigate the changes of inheritance in the form of increases (additions) and decreases (deletions) in number of classes, methods and attributes. Our analysis also includes the movement of classes within and across an inheritance hierarchy which is another compelling facet of evolution of inheritance and may not be extrapolated through incremental changes only. It requires a finer-grained scrutiny of evolutionary traits of inheritance. In addition, the Thesis also explores the trends of class interaction within and across an inheritance hierarchy and problems embedded in a system that may lead to faults, from an inheritance perspective. The results demonstrate how inheritance is used in practice, problems associated with inheritance and how inheritance hierarchies evolve as opposed to that of a ‘system’. Overall results informed our understanding of the trends in changes of inheritance in the evolution of Java systems.
|
446 |
Extensions to Jinni Mobile Agent ArchitectureTyagi, Satyam 05 1900 (has links)
We extend the Jinni mobile agent architecture with a multicast network transport layer, an agent-to-agent delegation mechanism and a reflection based Prolog-to-Java interface. To ensure that our agent infrastructure runs efficiently, independently of router-level multicast support, we describe a blackboard based algorithm for locating a randomly roaming agent. As part of the agent-to-agent delegation mechanism, we describe an alternative to code-fetching mechanism for stronger mobility of mobile agents with less network overhead. In the context of direct and reflection based extension mechanisms for Jinni, we describe the design and the implementation of a reflection based Prolog-to-Java interface. The presence of subtyping and method overloading makes finding the most specific method corresponding to a Prolog call pattern fairly difficult. We describe a run-time algorithm which provides accurate handling of overloaded methods beyond Java's reflection package's limitations.
|
447 |
The case for exception handlingZastre, Michael. 10 April 2008 (has links)
No description available.
|
448 |
Effective use of Java Data objects in developing database applications. Advantages and disadvantagesZilidis, Paschalis. 06 1900 (has links)
Approved for public release; distribution is unlimited / Currently, the most common approach in developing database applications is to use an object-oriented language for the frontend module and a relational database for the backend datastore. The major disadvantage of this approach is the well-known "impedance mismatch" in which some form of mapping is required to connect the objects in the frontend and the relational tuples in the backend. Java Data Objects (JDO) technology is recently proposed Java API that eliminates the impedance mismatch. By using JDO API, the programmers deal strictly with objects. JDO hides the details of the backend datastore by providing the object-oriented view of the datastore. JDO automatically handles the mapping between the objects and the underlying data in the relational database, which is hidden from the programmer. This thesis investigates the effectiveness of JDO. Part of the analysis will develop a database application using JDO. Although JDO provides the benefits of object-orientation in design and implementation of the databases, it is not immune from problems and limitations. The thesis will also analyze the advantages and disadvantages of using JDO and discuss the areas requiring improvements in future releases. / Major, Hellenic Air Force
|
449 |
Automated trojan detection and analysis in field programmable gate arraysaHoughton, Nicholas 16 December 2016 (has links)
Electronics have become such a staple in modern life that we are just as a ected
by their vulnerabilities as they are. Ensuring that the processors that control them
are secure is paramount to our intellectual safety, our nancial safety, our privacy,
and even our personal safety. The market for integrated circuits is steadily being
consumed by a recon gurable type of processor known as a eld-programmable gate-
array (FPGA). The very features that make this type of device so successful also
make them susceptible to attack. FPGAs are recon gured by software; this makes it
easy for attackers to make modi cation. Such modi cations are known as hardware
trojans. There have been many techniques and strategies to ensure that these devices
are free from trojans but few have taken advantage of the central feature of these
devices. The con guration Bitstream is the binary le which programs these devices.
By extracting and analyzing it, a much more accurate and e cient means of detecting
trojans can be achieved. This discussion presents a new methodology for exploiting
the power of the con guration Bitstream to detect and described hardware trojans.
A software application is developed that automates this methodology. / Graduate / 0537 / 0544 / 0984 / nhoughto@uvic.ca
|
450 |
Génération de patrons de conception et restructuration de code vers un patron de conception pour JavaTousignant, Jonathan January 2016 (has links)
(POO) est l’utilisation de patrons de conception (PC). Un PC est un arrangement caractéristique
de classes permettant d’offrir une solution éprouvée, tout en obtenant un code
réutilisable et compréhensible. Plusieurs PC sont définis, dont 24 par la GoF [12] et plusieurs
autres sont apparus par la suite. Le concept de PC est abstrait ce qui peut amener
différentes interprétations. Ces différences peuvent aussi causer une mauvaise implémentation
qui peut réduire les avantages d’utiliser ce patron. Ce projet consiste à concevoir
un outil facilitant l’utilisation des PC. L’outil Génération et Restructuration de Patrons
de Conception(GRPC) permet la génération automatique du squelette d’un patron de
conception ainsi que la restructuration d’un code en le transformant structure respectant
un PC. La génération et la restructuration automatique permettent d’obtenir un code
uniforme et de qualité tout en respectant le patron de conception. La compréhension et la
maintenance du code sont ainsi améliorées.
GRPC est module d’extension pour l’environnement de développement Eclipse écrit en
Java. Le code est conçu pour être facilement compréhensible et extensible. Les deux principaux
objectifs de GRPC sont de restructurer (refactoring) une section de code vers l’architecture
d’un patron de conception et de générer des squelettes de patrons de conception.
Une interface graphique permet de guider l’utilisateur et d’aller chercher toutes les informations
importantes pour le fonctionnement du logiciel. Elle permet aussi de configurer les
éléments du patron de conception. Pour s’assurer de la possibilité d’effectuer une restructuration,
chaque patron est associé avec une ou plusieurs règles qui analysent le code pour
détecter la présence d’une structure particulière. Des procédures aident les développeurs
à ajouter de nouveaux PC dans GRPC.
GRPC fournit des fonctionnalités permettant d’implémenter quelques patrons de conception
de la POO définis dans le livre Design Patterns : Elements of Reusable Object-Oriented
Software.
|
Page generated in 0.0258 seconds