• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 660
  • 348
  • 294
  • 174
  • 94
  • 74
  • 31
  • 26
  • 23
  • 23
  • 17
  • 14
  • 12
  • 11
  • 9
  • Tagged with
  • 1993
  • 549
  • 292
  • 266
  • 235
  • 223
  • 192
  • 190
  • 184
  • 178
  • 174
  • 174
  • 163
  • 141
  • 124
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
81

Frameworky pro objektově relační mapování / Object relational mapping frameworks

Patrný, Vojtěch January 2008 (has links)
This paper is about Java object relational frameworks and related processes. The goal of this work consists of showing design patterns for ORM, introducing Java ORM standards along with the main implementations, finding criteria for comparison of ORM frameworks and showing working ORM example in a case study. This paper has the following structure: The first part of this paper discusses main ORM design patters, approaches to ORM and performance related features of Java ORM frameworks. Next part describes available Java ORM standards and implementations and introduces case study attached to this part as appendix. The last part of this paper presents ORM frameworks comparison criteria and compares main implementations of the JPA standard.
82

Reality Check - Wie geht es Duke? Der aktuelle Entwicklungsstand von Java.

Huebsch, Chris 25 May 1999 (has links)
Vortrag UNIX Stammtisch 82 (05/1999)
83

The modernization of the pesantren's educational system to meet the needs of Indonesian communities /

Wagiman, Suprayetno. January 1997 (has links)
No description available.
84

The Cost Element Builder – a Tool for Creating and Editing Specific Java Code through a Graphical User Interface

Taneja, Anshuman 29 July 2004 (has links)
No description available.
85

Enhancing CryptoGuard's Deployability for Continuous Software Security Scanning

Frantz, Miles Eugene 21 May 2020 (has links)
The increasing development speed via Agile may introduce overlooked security steps in the process, with an example being the Iowa Caucus application. Verifying the protection of confidential information such as social security numbers requires security at all levels, providing protection through any connected applications. CryptoGuard is a static code analyzer for Java. This program verifies that developers do not leave vulnerabilities in their application. The program aids the developer by identifying cryptographic misuses such as hard-coded keys, weak program hashes, and using insecure protocols. In my Master thesis work, I made several important contributions to improving the deployability, accessibility, and usability of CryptoGuard. I extended CryptoGuard to scan source and compiled code, created live documentation, and supported a dual cloud and local tool-suite. I also created build tool plugins and a program aid for CryptoGuard. In addition, I also analyzed several Java-related surveys encompassing more than 50,000 developers and reported interesting current practices of real-world software developers. / Master of Science / Throughout the rise of software development, there has been an increase in development speed with developers embracing methodologies that use higher rates of changes, such as Agile. Since Agile naturally addresses "problems of rapid change", this also increases the likelihood of insecure and vulnerable coding practices. Though consumers depend on various public applications, there can still be failures throughout the development process in applications such as the Iowa caucus application. It was determined the Iowa cacus application development teams' repository credentials (API key) was left within the application itself. API keys provide the credential to be able to directly interact with server systems, and if left unguarded can be easily exploited. Since the Iowa cacus application was released publicly, malicious actors (other people looking to exploit the application) may have already discovered this credential. Within our team we have created CryptoGuard, a program to analyze applications to detect cryptographic issues such as an API key. Creating it with scalability in mind, it was created to be able to scan enterprise code at a reasonable speed. To ensure its use within companies, we have been working on extending and enhancing the work to the current needs of Java developers. Verifying the current Java landscape, we investigated three different companies and their developer ecosystem surveys that are publicly available. Amongst these companies are; JetBrains, known for their Integrated Development Environments (IDE, or application to help write applications) and their own programming language, Snyk, known for their public security platform and anti-virus capability, and Jakarta EE, which is the new platform for the enterprise version of Java. Throughout these surveys, we accumulate more than 50,000 developers' responses, spanning various countries, company experience, and ages. With their responses amalgamated, we enhance CryptoGuard to be available to as many developers and their requests as possible.First, CryptoGuard is enhanced to scan a projects source code. After that, ensuring our project is hosted by a cloud service, we actively are extending our project to the Security Assurance Marketplace (SWAMP). Funded by the DHS, SWAMP not only supplies a public cloud for developers to use, but a local download option to scan a program within the user's own computer. Next, we create a plugin for two most used build tools, Gradle and Maven. Then to ensure CryptoGuard can be have reactive aide, CryptoSoule is created to aide minimal interface aide. Finally utilizing a live documentation service, an open source documentation website was created to provide working examples to the community.
86

Improving the Precision of a Scalable Demand-Driven Null- Dereference Verification for Java

Margoor, Amogh January 2013 (has links) (PDF)
The problem addressed in this thesis is sound, scalable, demand-driven null-dereference verification for Java programs via over-approximated weakest preconditions analysis. The base version of this analysis having been described in a previous publication, in this thesis we focus primarily on describing two major optimizations that we have incorporated that allow for longer program paths to be traversed more efficiently, hence increasing the precision of the approach. The first optimization is to bypass certain expensive-to-analyze constructs, such as virtual calls with too many possible targets, by directly transferring dataflow facts from points after the construct to points before along def-use edges of a certain kind. The second optimization is to use manually constructed summaries of Java container class methods, rather than analyze the code of these methods directly. We evaluate our approach using 10 real world Java programs, as well as several micro benchmarks. We demonstrate that our optimizations result in a 45% reduction in false positives over the base version on the real programs, without significant impact on running time.
87

FotbollTracker

Nylander, Anders, Wikestad, Daniel January 2015 (has links)
No description available.
88

Sistema de automação e controle para aquisição de espectros de correlação angular gama-gama / Control system and automation of the spectrum acquisition for a perturbed gamma-gamma angular correlation spectrometer

Stachowski, Ademir Francisco Abade 15 February 2019 (has links)
Este trabalho relata os resultados de um projeto de automação de aquisição de dados de um dos espectrômetros de correlação angular perturbada gama-gama (PAC) do laboratório de interações hiperfinas (LIH) do IPEN. O espectrômetro é constituído de quatro detectores de cintilação (BaF3). Basicamente registra-se a diferença de temporal entre a detecção de quaisquer dois raios gamas emitidos em cascata (do núcleo de prova) incidentes em quaisquer dois detectores do espectrômetro. Dependendo das condições, o núcleo de prova ocupa determinados sítios de uma rede cristalina ou de uma macromolécula onde se pretende estudar as características elétricas e/ou magnéticas do meio nas áreas de física da matéria condensada ou biofísica. Para realização deste trabalho utilizou-se a linguagem Java por se tratar de uma linguagem de programação multiplataforma e orientada a objetos, possuindo, portanto, portabilidade e maior tempo de vida do software e devido à facilidade de implementação dos periféricos. Por fim, o software possui uma interface amigável e intuitiva, com o usuário podendo operar o sistema manualmente ou automaticamente, com aquisições de tempo de até 100 horas consecutivas. No modo automático, Antes de cada aquisição, o software seta a temperatura (do controlador), previamente definida pelo usuário, aguarda a estabilidade, processa a aquisição, registra os dados em arquivos diferentes (para temperaturas diferentes). Além disso, o software também salva em um arquivo todas as informações de parâmetros relevantes durante a aquisição. / This work reports results from the automation of data acquisition for a gamma-gamma perturbed angular correlation (PAC) spectrometer located in the hyperfine interactions laboratory (LIH) of IPEN. A PAC spectrometer comprises usually four scintillation detectors (BaF3). Basically, the time difference between the detection of any two gamma emitted rays (of the probe nuclei) incident on any two spectrometer detectors is recorded. Depending on the conditions, the probe nuclei occupies certain sites of a crystalline lattice or a macromolecule where it is intended to study the electrical and / or magnetic characteristics of the medium in the areas of condensed or biophysical matter physics. In order to perform this work, the Java language was used because it is a multiplatform and object-oriented programming language, thus having portability and longer software life and due to the ease of implementation of the peripherals. Finally, the software has a friendly and intuitive interface with the user being able to operate the hardware manually or automatically with time acquisitions up to 100 consecutive hours. In automatic mode, the software sets the temperature (controller) previously set by the user, awaits stability, processes the acquisition, and records the data in different files (for different temperatures) before each acquisition. In addition, the software also saves to a file all relevant parameter information during acquisition.
89

SHAP — Scalable Multi-Core Java Bytecode Processor

Zabel, Martin, Spallek, Rainer G. 14 November 2012 (has links) (PDF)
Abstract This paper introduces a new embedded Java multi-core architecture which shows a significantly better performance for a large number of cores than the related projects JopCMP and jamuth IP multi-core. The cores gain fast access to the shared heap by a fullduplex bus with pipelined transactions. Each core is equipped with local on-chip memory for the Java operand stack and the method cache to further reduce the memory bandwidth requirements. As opposed to the related projects, synchronization is supported on a per object-basis instead of a single lock. Load balancing is implemented in Java and requires no additional hardware. The multi-port memory manager includes an exact and fully concurrent garbage collector for automatic memory management. The design can be synthesized for a variable number of parallel cores and shows a linear increase in chip-space. Three different benchmarks demonstrate the very good scalability of our architecture. Due to limited chip-space on our evaluation platform, the core count could not be increased further than 8. But, we expect a smooth performance decrease.
90

De ontsluiting van Java's binnenland voor het wereldverkeer ...

Burger, D. H. January 1900 (has links)
Proefschrift--Leyden. / "Stellingen": [2] p. laid in. "Summary": p. 244-247. "Lijst van aangehaaide literatuur": p. [248]-253.

Page generated in 0.0482 seconds