Academic literature on the topic 'Java'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Java.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Java"
Sabharwal, C. L. "Java, Java, Java." IEEE Potentials 17, no. 3 (1998): 33–37. http://dx.doi.org/10.1109/45.714612.
Full textBik, Aart J. C., Juan E. Villacis, and Dennis B. Gannon. "javar: A prototype Java restructuring compiler." Concurrency: Practice and Experience 9, no. 11 (November 1997): 1181–91. http://dx.doi.org/10.1002/(sici)1096-9128(199711)9:11<1181::aid-cpe335>3.0.co;2-f.
Full textKurniawan, Nia, Ahmad Muammar Kadafi, Muhammad Fathoni, Richo Firmansyah, Kartika Prabasari, and Muhammad Alif Fauzi. "A New Distribution Record of <i>Polypedates pseudotilophus</i> (Anura: Rhachoporidae) from East Java, Based on Morphology and Molecular Evidence." Russian Journal of Herpetology 30, no. 3 (June 27, 2023): 167–74. http://dx.doi.org/10.30906/1026-2296-2023-30-3-167-174.
Full textFlanagan, David, Patrick Niemeyer, Joshua Peck, Roger Sipson, Susan McKay, and Wolfgang Christian. "Java in a Nutshell; Exploring JAVA." Computers in Physics 11, no. 1 (1997): 46. http://dx.doi.org/10.1063/1.4822513.
Full textHavelund, Klaus, and Grigore Roşu. "Monitoring Java Programs with Java PathExplorer." Electronic Notes in Theoretical Computer Science 55, no. 2 (October 2001): 200–217. http://dx.doi.org/10.1016/s1571-0661(04)00253-1.
Full textDrysdale, Scot, Judith Hromcik, Mark Allen Weiss, and Reg Hahne. "Java in the morning...Java in the evening...Java in 2004." ACM SIGCSE Bulletin 35, no. 1 (January 11, 2003): 271–72. http://dx.doi.org/10.1145/792548.611909.
Full textReinaldy H, Revel Aldwin, Essy Malays Sari Sakti, and Marnis Marnis. "RANCANG BANGUN APLIKASI JASA TITIP BERBASIS ANDROID." Tekinfo: Jurnal Bidang Teknik Industri dan Teknik Informatika 22, no. 1 (June 13, 2021): 81–87. http://dx.doi.org/10.37817/tekinfo.v22i1.1187.
Full textHartel, Pieter H., and Luc Moreau. "Formalizing the safety of Java, the Java virtual machine, and Java card." ACM Computing Surveys 33, no. 4 (December 2001): 517–58. http://dx.doi.org/10.1145/503112.503115.
Full textHavelund, Klaus, and Thomas Pressburger. "Model checking JAVA programs using JAVA PathFinder." International Journal on Software Tools for Technology Transfer (STTT) 2, no. 4 (March 1, 2000): 366–81. http://dx.doi.org/10.1007/s100090050043.
Full textRahayu, Imelia, Alusyanti Primawati, and Aulia Ar Rakhman Awaludin. "Perancangan Aplikasi Pemesanan Jasa Salon Tyas Kampung Gedong Berbasis Java." Jurnal Riset dan Aplikasi Mahasiswa Informatika (JRAMI) 4, no. 01 (January 15, 2023): 181–86. http://dx.doi.org/10.30998/jrami.v4i01.7155.
Full textDissertations / Theses on the topic "Java"
Francisco, Pedro Filipe do Amaral Goucha. "Contract-Java - design by contract in Java - Contract-Java." Master's thesis, Universidade de Aveiro, 2012. http://hdl.handle.net/10773/11035.
Full textA programação por contrato é uma metodologia de programação que implementa mecanismos de correcção de forma bem adaptada à programação orientada por objectos, facilitando a construção de software correto e robusto, permitindo também a sua documentação e especificação e a construção de programas tolerantes a falhas. No entanto, ao contrário da programação orientada por objectos, a programação por contrato tem uma difusão bastante reduzida. Uma das razões para tal facto é a quase completa ausência de suporte para a metodologia na grande maioria das linguagens de programação usadas actualmente, nas quais se inclui a linguagem Java. Apesar de existirem algumas ferramentas para tentar suprir essa omissão da linguagem Java, são aproximações incompletas que não permitem usufruir de todas as vantagens e capacidades da programação por contrato. Neste trabalho pretende-se definir quais as características necessárias numa linguagem de modo a permitir a implementação completa da metodologia, avaliando as falhas que as ferramentas existentes possuem e, de seguida, definir e construir uma nova linguagem, “Contract-Java”, definida como uma extensão da linguagem Java, que permita usar a programação por contrato na sua totalidade.
Design by Contract is a programming methodology which implements correction mechanisms well adapted to object-oriented programming, easing the construction of correct and robust software, as well as allowing its documentation and specification and the construction of fault-tolerance programs. However, unlike object-oriented programming, Design by Contract has a very low distribution. One of the reasons for such is the lack of support for it on most programming languages currently in use, in which Java is included. Although a few tools attempt to workaround such lack of support, they all present incomplete approaches which do not support all the advantages and capabilities of Design by Contract. In this work, we intend to define which characteristics are necessary in order to fully implement the methodology, evaluating the faults of existing tools and, afterwards, defining and constructing a new language, “Contract-Java”, defined as an extension of the Java language, which allows to use Design by Contract in its entirety.
Drejhammar, Frej. "Flow Java : declarative concurrency for Java." Licentiate thesis, KTH, Microelectronics and Information Technology, IMIT, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-287.
Full textThis thesis presents the design, implementation, and evaluation of Flow Java, a programming language for the implementation of concurrent programs. Flow Java adds powerful programming abstractions for automatic synchronization of concurrent programs to Java. The abstractions added are single assignment variables (logic variables) and futures (read-only views of logic variables).
The added abstractions conservatively extend Java with respect to types, parameter passing, and concurrency. Futures support secure concurrent abstractions and are essential for seamless integration of single assignment variables into Java. These abstractions allow for simple and concise implementation of high-level concurrent programming abstractions.
Flow Java is implemented as a moderate extension to the GNU GCJ/libjava Java compiler and runtime environment. The extension is not speci c to a particular implementation, it could easily be incorporated into other Java implementations.
The thesis presents three implementation strategies for single assignment variables. One strategy uses forwarding and dereferencing while the two others are variants of Taylor's scheme. Taylor's scheme represents logic variables as a circular list. The thesis presents a new adaptation of Taylor's scheme to a concurrent language using operating system threads.
The Flow Java system is evaluated using standard Java benchmarks. Evaluation shows that in most cases the overhead incurred by the extensions is between 10% and 50%. For some pathological cases the runtime increases by up to 150%. Concurrent programs making use of Flow Java's automatic synchronization, generally perform as good as corresponding Java programs. In some cases Flow Java programs outperform Java programs by as much as 33%.
Drejhammar, Frej. "Flow Java : declarative concurrency for Java /." Licentiate thesis, Stockholm : Department of Microelectronics and Information Technology, Royal Institute of Technology, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-287.
Full textBwogi, Andrew, and Tuncay Dagdelen. "Configuring Java Pathfinder for concurrent Java programs." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208369.
Full textProgramverifikation är ett datalogiskt fält som säkerställer att pro- gram fungerar enligt en formaliserad specifikation. Modellkontroll är ett delområde i programverifikation som testar alla möjliga tillstånd i ett program för att se om de uppfyller en mängd formaliserade egen- skaper. Java Pathfinder (JPF) är ett verktyg som automatiskt kontrolle- rar bytekod i Java. Syftet med den här rapporten är att undersöka vil- ka generella konfigurationsmönster som finns för särskilda program- typer som leder till att JPF antingen terminerar utan fel eller med ett funnet samverkningsfel. Programtyperna som undersöks är lösningar till producer/consumer-problem, barber shop-problem, reader/wri- ter-problem och program som faller under typen server/klient-pro- gram. Metoden består i huvudsak först av sökning efter program i molnbaserade versionshanteringssystem. Sedan följer programkontroll med hjälp av JPF-dokumentation, artiklar om ämnet och diskussions- grupper online. Resultatet är ett antal konfigurationer som leder till inga fel, fel på grund av samtidig trådkörning och fel på grund av di- rekt körbar kod, beroende på det verifierade programmet. En viktig begränsning med rapporten är frånvaron av stora program som tes- tar JPFs hantering av stora tillståndsrymder. De funna generella kon- figurationerna är tillämpbara på små program som inte använder di- rekt körbar kod. En generell konfiguration hittades även för program som använder direkt körbar kod, men här måste användaren eventu- ellt skriva om en modellklass i JPF.
Doyon, Stéphane. "On the security of Java, the Java bytecode verifier." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0004/MQ41890.pdf.
Full textRomio, Giovanni. "Backport di una applicazione da Java 8 a Java 7." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/10481/.
Full textKwon, Jagun. "Ravenscar-Java: Java Technology for High-Integrity Real-Time Systems." Thesis, University of York, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.485101.
Full textAnders, Jörg. "Java MPEG1-Player." Universitätsbibliothek Chemnitz, 2003. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200300738.
Full textBatchelder, Michael Robert. "Java bytecode obfuscation." Thesis, McGill University, 2007. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=18300.
Full textLes programmes écrits pour l'exécution d'ordinateur seront toujours susceptibles au vol d'information. Cette information peut inclure des algorithmes de marque de commerce, des données incluses dans le programme, ou même des données concernant les accès de programme. Suivant les avancées technologiques, les informaticiens construisent des outils de plus en plus puissants pour l'ingénierie inverse telle que le décompilateur. Le langage de programmation de Java est particulièrement ouvert aux attaques de l'ingénierie inverse en raison de son format binaire bien défini, ouvert, et portatif. Nous recherches portent sur un domaine permettant de mieux sécuriser fixer la propriété intellectuelle des programmes en Java; obscurcissement. L'obscurcissement d'un programme implique de transformer le code du programme en une représentation plus complexe mais sémantiquement équivalente. Ceci peut inclure l'addition de l'écoulement embrouillant de commande, de la supression de certaines informations incluses dans les programmes dont l'exécution n'est pas spécifiquement exigée, ou de la dissimulation des données. Excepté les techniques cryptologique s, l'obscurcissement est l'une des seules techniques disponibles. Même si beaucoup de stratégies de l'obscurissment sont finalement réversibles, il gêne sérieusement ceux qui essayent de voler l'information en augmentant la durée de calcul et la puissance exigées par les logicels d'ingénierie inverse et augmente considérablement la complexité de n'importe quel code source récupere par cette technique. Dans cette thèse nous présentons un certain nombre de transformations d'obscurcissement mises en application dans un outil automatique que nous appelons le Java Bytecode Obfuscator (JBCO). Nous présentons des mesures empiriques des coûts d'exécution de ces transformations en termes de vitesse d'exécution et taille de programme. Des mesures de complexité qui mesurent l'efficacité des obscurc
Bezděk, Pavel. "Gramatická evoluce – Java." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2009. http://www.nusl.cz/ntk/nusl-228412.
Full textBooks on the topic "Java"
R, Walde, ed. Java, Java, Java: Object-oriented problem solving. 3rd ed. Upper Saddle River, NJ: Pearson Prentice Hall, 2006.
Find full textHutton, Peter. Java. (London): APA, 1993.
Find full textRitchey, Tim. Java! Indianapolis: New Riders, 1995.
Find full textSchader, Martin, and Lars Schmidt-Thieme. Java. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/978-3-662-08043-6.
Full textLouis, Dirk, and Peter Müller. Java. München: Carl Hanser Verlag GmbH & Co. KG, 2014. http://dx.doi.org/10.3139/9783446438347.
Full textFisher, Timothy R. Java. Paris: CampusPress, 2007.
Find full textHutton, Peter. Java. Edited by Allan Jeremy, Invernizzi Luca, and Hoefer Hans. [Hong Kong]: APA Publication, 1993.
Find full textNewman, Alexander. Java. Paris: Simon & Schuster Macmillan (France), 1996.
Find full textEric, Oey, ed. Java. 3rd ed. [Hong Kong]: Periplus Editions, 1997.
Find full text1959-, Coatalem Jean-Luc, ed. Java. Amsterdam: Oog & Blik, 1996.
Find full textBook chapters on the topic "Java"
Fischer, Clemens, and Dieter Meemken. "JaWA: Java with Assertions." In JIT’98 Java-Informations-Tage 1998, 49–58. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-642-59984-2_5.
Full textStärk, Robert F., Joachim Schmid, and Egon Börger. "The imperative core JavaI of Java." In Java and the Java Virtual Machine, 33–46. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/978-3-642-59495-3_3.
Full textShekhar, Shashi, and Hui Xiong. "Java." In Encyclopedia of GIS, 601. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-35973-1_663.
Full textBuchanan, W. J. "Java." In The Complete Handbook of the Internet, 1131–73. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-0-306-48331-8_52.
Full textEdwards, Stephen A. "Java." In Languages for Digital Embedded Systems, 165–76. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4325-1_9.
Full textRumpe, Bernhard. "Java." In Xpert.press, 237–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22413-3_8.
Full textHansmann, Uwe, Lothar Merk, Martin S. Nicklous, and Thomas Stober. "Java." In Pervasive Computing Handbook, 121–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/978-3-662-04318-9_6.
Full textWeik, Martin H. "JAVA." In Computer Science and Communications Dictionary, 844. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_9664.
Full textTripiccione, Raffaele, Michael Philippsen, Rolf Riesen, and Arthur B. Maccabe. "Java." In Encyclopedia of Parallel Computing, 992. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-0-387-09766-4_2075.
Full textRennie, Frank, and Keith Smyth. "Java." In Digital Learning: The Key Concepts, 89. 2nd ed. London: Routledge, 2019. http://dx.doi.org/10.4324/9780429425240-112.
Full textConference papers on the topic "Java"
Jacques-Silva, Gabriela, Regina Lúcia de O. Moraes, Taisy Silva Weber, and Eliane Martins. "Validando Sistemas Distribuídos Desenvolvidos em Java Utilizando Injeção de Falhas de Comunicação por Software." In Workshop de Testes e Tolerância a Falhas. Sociedade Brasileira de Computação - SBC, 2004. http://dx.doi.org/10.5753/wtf.2004.23379.
Full textWaldo, Jim. "Java." In the 19th international conference. New York, New York, USA: ACM Press, 1997. http://dx.doi.org/10.1145/253228.253539.
Full textCazzola, Walter, and Edoardo Vacchi. "@Java." In the 28th Annual ACM Symposium. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2480362.2480679.
Full textBarbuti, Roberto, and Stefano Cataudella. "Java bytecode verification on Java cards." In the 2004 ACM symposium. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/967900.967991.
Full textDrysdale, Scot, Judith Hromcik, Mark Allen Weiss, and Reg Hahne. "Java in the morning...Java in the evening...Java in 2004." In the 34th SIGCSE technical symposium. New York, New York, USA: ACM Press, 2003. http://dx.doi.org/10.1145/611892.611909.
Full textCok, David R. "Specifying java iterators with JML and Esc/Java2." In the 2006 conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1181195.1181210.
Full textSchoeberl, Martin, and Juan Ricardo Rios. "Safety-critical Java on a Java processor." In the 10th International Workshop. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2388936.2388946.
Full textLupoli, Shawn, and Heather Stephens. "Exploring Java Programming after Java Version 8." In SIGCSE 2024: The 55th ACM Technical Symposium on Computer Science Education. New York, NY, USA: ACM, 2024. http://dx.doi.org/10.1145/3626253.3633434.
Full textKwon, Jagun, Andy Wellings, and Steve King. "Ravenscar-Java." In the 2002 joint ACM-ISCOPE conference. New York, New York, USA: ACM Press, 2002. http://dx.doi.org/10.1145/583810.583825.
Full textCavé, Vincent, Jisheng Zhao, Jun Shirako, and Vivek Sarkar. "Habanero-Java." In the 9th International Conference. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2093157.2093165.
Full textReports on the topic "Java"
Abi-Antoun, Marwan, and Jonathan Aldrich. JavaD: Bringing Ownership Domains to Mainstream Java. Fort Belvoir, VA: Defense Technical Information Center, May 2006. http://dx.doi.org/10.21236/ada456237.
Full textJohnson, Anthony S. Java Analysis Studio. Office of Scientific and Technical Information (OSTI), October 1998. http://dx.doi.org/10.2172/9932.
Full textLong, Fred. Software Vulnerabilities in Java. Fort Belvoir, VA: Defense Technical Information Center, October 2005. http://dx.doi.org/10.21236/ada443139.
Full textFranco, J. Network Servers and Java,. Fort Belvoir, VA: Defense Technical Information Center, December 1996. http://dx.doi.org/10.21236/ada326051.
Full textVarma, Ankush, and Shuvra S. Bhattacharyya. Java-through-C Compilation: An Enabling Technology for Java in Embedded Systems. Fort Belvoir, VA: Defense Technical Information Center, February 2004. http://dx.doi.org/10.21236/ada455085.
Full textLeague, Christopher, Valery Trifonov, and Zhong Shao. Type-Preserving Compilation of Featherweight Java. Fort Belvoir, VA: Defense Technical Information Center, January 2005. http://dx.doi.org/10.21236/ada436466.
Full textPiszcz, Alan, and Kent Vidrine. Real-Time Java Commercial Product Assessment. Fort Belvoir, VA: Defense Technical Information Center, October 2000. http://dx.doi.org/10.21236/ada458007.
Full textConn, Eric S. JAVA-Based Performance Oriented Visualization System. Fort Belvoir, VA: Defense Technical Information Center, April 2003. http://dx.doi.org/10.21236/ada415539.
Full textFriedman-Hill, E. J. Jess, the Java expert system shell. Office of Scientific and Technical Information (OSTI), November 1997. http://dx.doi.org/10.2172/565603.
Full textHarkema, Marcel, Dick Quartel, Rob van der Mei, and Bart Gijsen. JPMT: A Java Performance Monitoring Tool. Centre for Telematics and Information Technology (CTIT), 2003. http://dx.doi.org/10.3990/1.5152400.
Full text