Dissertations / Theses on the topic 'Java'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Java.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Francisco, Pedro Filipe do Amaral Goucha. "Contract-Java - design by contract in Java - Contract-Java." Master's thesis, Universidade de Aveiro, 2012. http://hdl.handle.net/10773/11035.
Full textA programação por contrato é uma metodologia de programação que implementa mecanismos de correcção de forma bem adaptada à programação orientada por objectos, facilitando a construção de software correto e robusto, permitindo também a sua documentação e especificação e a construção de programas tolerantes a falhas. No entanto, ao contrário da programação orientada por objectos, a programação por contrato tem uma difusão bastante reduzida. Uma das razões para tal facto é a quase completa ausência de suporte para a metodologia na grande maioria das linguagens de programação usadas actualmente, nas quais se inclui a linguagem Java. Apesar de existirem algumas ferramentas para tentar suprir essa omissão da linguagem Java, são aproximações incompletas que não permitem usufruir de todas as vantagens e capacidades da programação por contrato. Neste trabalho pretende-se definir quais as características necessárias numa linguagem de modo a permitir a implementação completa da metodologia, avaliando as falhas que as ferramentas existentes possuem e, de seguida, definir e construir uma nova linguagem, “Contract-Java”, definida como uma extensão da linguagem Java, que permita usar a programação por contrato na sua totalidade.
Design by Contract is a programming methodology which implements correction mechanisms well adapted to object-oriented programming, easing the construction of correct and robust software, as well as allowing its documentation and specification and the construction of fault-tolerance programs. However, unlike object-oriented programming, Design by Contract has a very low distribution. One of the reasons for such is the lack of support for it on most programming languages currently in use, in which Java is included. Although a few tools attempt to workaround such lack of support, they all present incomplete approaches which do not support all the advantages and capabilities of Design by Contract. In this work, we intend to define which characteristics are necessary in order to fully implement the methodology, evaluating the faults of existing tools and, afterwards, defining and constructing a new language, “Contract-Java”, defined as an extension of the Java language, which allows to use Design by Contract in its entirety.
Drejhammar, Frej. "Flow Java : declarative concurrency for Java." Licentiate thesis, KTH, Microelectronics and Information Technology, IMIT, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-287.
Full textThis thesis presents the design, implementation, and evaluation of Flow Java, a programming language for the implementation of concurrent programs. Flow Java adds powerful programming abstractions for automatic synchronization of concurrent programs to Java. The abstractions added are single assignment variables (logic variables) and futures (read-only views of logic variables).
The added abstractions conservatively extend Java with respect to types, parameter passing, and concurrency. Futures support secure concurrent abstractions and are essential for seamless integration of single assignment variables into Java. These abstractions allow for simple and concise implementation of high-level concurrent programming abstractions.
Flow Java is implemented as a moderate extension to the GNU GCJ/libjava Java compiler and runtime environment. The extension is not speci c to a particular implementation, it could easily be incorporated into other Java implementations.
The thesis presents three implementation strategies for single assignment variables. One strategy uses forwarding and dereferencing while the two others are variants of Taylor's scheme. Taylor's scheme represents logic variables as a circular list. The thesis presents a new adaptation of Taylor's scheme to a concurrent language using operating system threads.
The Flow Java system is evaluated using standard Java benchmarks. Evaluation shows that in most cases the overhead incurred by the extensions is between 10% and 50%. For some pathological cases the runtime increases by up to 150%. Concurrent programs making use of Flow Java's automatic synchronization, generally perform as good as corresponding Java programs. In some cases Flow Java programs outperform Java programs by as much as 33%.
Drejhammar, Frej. "Flow Java : declarative concurrency for Java /." Licentiate thesis, Stockholm : Department of Microelectronics and Information Technology, Royal Institute of Technology, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-287.
Full textBwogi, Andrew, and Tuncay Dagdelen. "Configuring Java Pathfinder for concurrent Java programs." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208369.
Full textProgramverifikation är ett datalogiskt fält som säkerställer att pro- gram fungerar enligt en formaliserad specifikation. Modellkontroll är ett delområde i programverifikation som testar alla möjliga tillstånd i ett program för att se om de uppfyller en mängd formaliserade egen- skaper. Java Pathfinder (JPF) är ett verktyg som automatiskt kontrolle- rar bytekod i Java. Syftet med den här rapporten är att undersöka vil- ka generella konfigurationsmönster som finns för särskilda program- typer som leder till att JPF antingen terminerar utan fel eller med ett funnet samverkningsfel. Programtyperna som undersöks är lösningar till producer/consumer-problem, barber shop-problem, reader/wri- ter-problem och program som faller under typen server/klient-pro- gram. Metoden består i huvudsak först av sökning efter program i molnbaserade versionshanteringssystem. Sedan följer programkontroll med hjälp av JPF-dokumentation, artiklar om ämnet och diskussions- grupper online. Resultatet är ett antal konfigurationer som leder till inga fel, fel på grund av samtidig trådkörning och fel på grund av di- rekt körbar kod, beroende på det verifierade programmet. En viktig begränsning med rapporten är frånvaron av stora program som tes- tar JPFs hantering av stora tillståndsrymder. De funna generella kon- figurationerna är tillämpbara på små program som inte använder di- rekt körbar kod. En generell konfiguration hittades även för program som använder direkt körbar kod, men här måste användaren eventu- ellt skriva om en modellklass i JPF.
Doyon, Stéphane. "On the security of Java, the Java bytecode verifier." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0004/MQ41890.pdf.
Full textRomio, Giovanni. "Backport di una applicazione da Java 8 a Java 7." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/10481/.
Full textKwon, Jagun. "Ravenscar-Java: Java Technology for High-Integrity Real-Time Systems." Thesis, University of York, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.485101.
Full textAnders, Jörg. "Java MPEG1-Player." Universitätsbibliothek Chemnitz, 2003. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200300738.
Full textBatchelder, Michael Robert. "Java bytecode obfuscation." Thesis, McGill University, 2007. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=18300.
Full textLes programmes écrits pour l'exécution d'ordinateur seront toujours susceptibles au vol d'information. Cette information peut inclure des algorithmes de marque de commerce, des données incluses dans le programme, ou même des données concernant les accès de programme. Suivant les avancées technologiques, les informaticiens construisent des outils de plus en plus puissants pour l'ingénierie inverse telle que le décompilateur. Le langage de programmation de Java est particulièrement ouvert aux attaques de l'ingénierie inverse en raison de son format binaire bien défini, ouvert, et portatif. Nous recherches portent sur un domaine permettant de mieux sécuriser fixer la propriété intellectuelle des programmes en Java; obscurcissement. L'obscurcissement d'un programme implique de transformer le code du programme en une représentation plus complexe mais sémantiquement équivalente. Ceci peut inclure l'addition de l'écoulement embrouillant de commande, de la supression de certaines informations incluses dans les programmes dont l'exécution n'est pas spécifiquement exigée, ou de la dissimulation des données. Excepté les techniques cryptologique s, l'obscurcissement est l'une des seules techniques disponibles. Même si beaucoup de stratégies de l'obscurissment sont finalement réversibles, il gêne sérieusement ceux qui essayent de voler l'information en augmentant la durée de calcul et la puissance exigées par les logicels d'ingénierie inverse et augmente considérablement la complexité de n'importe quel code source récupere par cette technique. Dans cette thèse nous présentons un certain nombre de transformations d'obscurcissement mises en application dans un outil automatique que nous appelons le Java Bytecode Obfuscator (JBCO). Nous présentons des mesures empiriques des coûts d'exécution de ces transformations en termes de vitesse d'exécution et taille de programme. Des mesures de complexité qui mesurent l'efficacité des obscurc
Bezděk, Pavel. "Gramatická evoluce – Java." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2009. http://www.nusl.cz/ntk/nusl-228412.
Full textFuhrmann, Klaus. "Formen der javanischen Pilgerschaft zu Heiligenschreinen." [S.l. : s.n.], 2000. http://deposit.ddb.de/cgi-bin/dokserv?idn=963866273.
Full textShabani, Shahpar. "Pure Java interface to a DSMS : Pure Java interface to a DSMS." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-423975.
Full textGaringo, Gary D. "JAVA based data connectivity." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1997. http://handle.dtic.mil/100.2/ADA342181.
Full text"September 1997." Thesis advisor(s): LuQi, V. Berzins. Includes bibliographical references (p. 63). Also available online.
Long, Bradley. "Testing concurrent Java components /." [St. Lucia, Qld.], 2005. http://www.library.uq.edu.au/pdfserve.php?image=thesisabs/absthe18735.pdf.
Full textManson, Jeremy. "The Java memory model." College Park, Md. : University of Maryland, 2004. http://hdl.handle.net/1903/1949.
Full textThesis research directed by: Computer Science. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Klein, Gerwin. "Verified Java bytecode verification." [S.l. : s.n.], 2003. http://deposit.ddb.de/cgi-bin/dokserv?idn=967128749.
Full textGatzka, Stephan. "Java in eingebetteten Systemen." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2009. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-20616.
Full textModern, object oriented languages do not play an important role when developing software for embedded systems. There are many reasons for it, most often an inadequate performance and a greater memory demand are mentioned. In spite of the fact that Java has many features suitable for embedded systems, Java often faces the prejudice to consume too much resources in systems with limited processing power and memory. This work is a contribution to diminish this prejudices. It presents techniques to limit the memory demands of a Java Virtual Machine and to effectively cope with limited computing power. Many of the presented methods and algorithms are implemented in the Kertasarie VM, a JVM designed to run in embedded systems.Due to the fact of increasing network capabilities embedded systems often face the problem of a modern, abstract and efficient communication. Therefore the second emphasis of this work is put on the comparison of object oriented middleware architectures, especially Java-RMI. An own implementation for embedded systems is also presented
Klerehag, Peter, and Joakim Lindberg. "Simulerad arbetsmiljö i Java." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-52451.
Full textWeiße, Carsten, and Rene Stöckel. "Quake II meets Java." Universitätsbibliothek Chemnitz, 2005. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200500863.
Full textGawetski, Krys. "Java data base connectivity." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape16/PQDD_0013/MQ31577.pdf.
Full textNguyen, Vu. "Class firewalls in Java." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0021/MQ48439.pdf.
Full textBakrim, Rachid. "Les assertions dans Java." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0006/MQ41845.pdf.
Full textLiu, Shendun. "Quick Java refactoring tool." Thesis, California State University, Long Beach, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=1524137.
Full textObject Oriented Programming (OOP) is a contemporary favorite method of programming. OOP provides better flexibility, source codes are more organized and systematized, and it enables a group of developers to easily work with each other. Nevertheless, a poorly designed system will not only defeat the intention of coding with OOP, but also will make the software extremely difficult to maintain.
Refactoring is a powerful way to improve existing code. It only changes the structure of the source code without changing its functionality. Manually refactoring larger systems not only consumes large amounts of time and money, but it also happens to be incredibly inaccurate. As a result, quick and easy refactoring with partial automation is extensively discussed in the software realm.
This thesis presents algorithms for implementing nine refactorings that work on the fly for JAVA source code. The refactorings algorithms are implemented in a stepwise manner by initially selecting the source code portion for refactoring, and by choosing the correct refactoring method, and then programmatically changing the selected source code to achieve refactoring.
Naeem, Nomair A. "Programmer-friendly decompiled Java." Thesis, McGill University, 2006. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=101644.
Full textThe work presented can be broken into three major categories: transformations using tree traversals and pattern matching to simplify the control flow, the creation of a flow analysis framework for an Abstract Syntax Tree (AST) representation of Java source code and the implementation of flow analyses with their use in complicated transformations.
The pattern matching transformations rewrite the ASTs to semantically-equivalent ASTs that correspond to code that is easier for programmers to understand. The targeted Java constructs include If and If-Else aggregation, for-loop creation and the removal of abrupt control flow. Pattern matching using tree traversals has its limitations. Thus, we introduce a new structure-based data flow analysis framework that can be used to gather information required by more complex transformations. Popular compiler analyses e.g., reaching definitions, constant propagation etc. were implemented using the framework. Information from these analyses is then leveraged to perform more advanced AST transformations.
We performed experiments comparing different decompiler outputs for different sources of bytecode. The results from these experiments indicate that the new Dava back-end considerably improves code comprehensibility and readability.
Parkinson, Matthew John. "Local reasoning for Java." Thesis, University of Cambridge, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.613674.
Full textCarlstrom, Brian D. (Brian David) 1973. "Embedding scheme in Java." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/16764.
Full textIncludes bibliographical references (p. 171-176).
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Extension languages are an important part of modern applications development. Java as a platform does not provide a standard extension language. Scheme is one possible choice as an extension language for Java. There are a variety of techniques for implementing Scheme in Java varying from interpreting s-expressions to compiling into Java byte-codes. The historical evolution of one implementation is discussed over the course of several years. The design of the Java-to-Scheme and Scheme-to-Java interfaces is reviewed. The advantages and disadvantages of Java and Scheme are compared.
by Brian D. Carlstrom.
M.Eng.
Ollila, A. (Antti). "Java-pohjaiset ohjelmalliset transaktiomuistit." Master's thesis, University of Oulu, 2015. http://urn.fi/URN:NBN:fi:oulu-201505211559.
Full textZavaleta, Gavidia Jorge Juan. "Programação funcional usando Java." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 1997. http://hdl.handle.net/10183/20923.
Full textSince the introduction of the World Wide Web to the world in the beginning of the nineties, using the Internet as a network to transfer data, using a form of expression called Hypertext, which connects related and combined information with multimedia, the resulting Webs have opened new possibilities of expression and communication. The amount of data traffic in the Web and the number of computers offering information have been growing dramatically, but there is a lack of interactive expressivity and quality in the Web; nevertheless, its instructive and useful interest is growing wider. From the unlimited universe of possibilities of the Web to access safe, portable and independent applications for each platform in hardware and software and that are able to get anywhere on the Internet, there is the Java Sun Mycrosystem language [DEC 95]. Java's ability to perform code on remote hosts in a safe way is a critical need for many software developing organizations and Internet providers nowadays [ARN 96]. Java language is really valuable for network environments arranged as the Web. However, Java extends further from this domain as it provides a broad programming language that is powerful and adequate to build a variety of applications which do not depend on the characteristics of the network [ARN 96]. The prevailing traditional model is a pattern and almost universal, has had a deep influence on the nature of the programming languages and there is still a trend of one direction to provide more and more abstract ways of solving problems, trying to change the simplicity in the fast programming in programs run [FIE 88]. It seems, therefore, natural and almost inevitable the development in technology of the programming languages. Wide efforts were made to develop strict methods to specify, produce, check software and hardware products, but the efforts were restricted to conventional languages. Von Neumann's natural approximation has contributed to this gap since the notion of a global state which can change arbitrarily in each step of the computer science and has proven to be intuitively and mathematically intractable. This gap has turned the software into the most expensive component for many computing systems [GLA 84]. The first steps to solve these gaps were taken by the structured programming when working on the areas of formal specification, programs checking and the formal semantics, which are still being researched. The ever growing number of researchers are sure that the problems come from the fundamental approximation to Von Neumann's philosophy and are turning to a new kind of language. One of such approximations is the one through the functional programming languages [PLA 93]. In a functional program, the result of a called function is determined only by the present values of the function arguments [PLA 93]. The functional programming languages have the advantage of offering a general use of the functions, which is not available in the classic prevailling lan guages [PLA 93]. Due to absence of side effects, the correction tests in the programs are easier than in the prevailing languages. The functions may be evaluated in any order and so may their total disposal. The new generation of functional languages also offers an elegant notion of friendly use [PLA 93]. The patterns and protection offer the user a simple access to complex data structures, basically by not worrying about memory management, as occurs with the Java language. The main objetive of this work is the description of the implementation of a Java Functions Builder (Lisp1), used do generate Lisp functions in Java code utilizing the Java language from Sun microsystem as a developing environment. The description covers the code of the Lisp Interpreter of the LISP functional language, and the Java Functions Builder code visualized through a Java applet utilized as interface between the Java Functions Builder and the users on the Internet.
Замятин, Д. С., and Я. В. Пишта. "Методы защиты java программ." Thesis, Издательство СумГУ, 2011. http://essuir.sumdu.edu.ua/handle/123456789/25297.
Full textTomaštík, Marek. "Genetické programování - Java implementace." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2013. http://www.nusl.cz/ntk/nusl-230616.
Full textAhmed, Sipan. "Java integrering med PLC." Thesis, Högskolan i Gävle, Avdelningen för elektroteknik, matematik och naturvetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-33196.
Full textDigitaliseringen har fått en större roll i övervakning och styrning av en processanläggning. Denna trend kommer att växa globalt för att uppnå en smartare produktionskedja som giver ekonomiska vinster. Syftet med detta examensarbete var att utveckla en befintlig process som föreställer en automatiserad borrstation. Detta styrs genom lufttryck, sensorer, cylindrar och relä ventiler. Utvecklingen skedde genom att integrera Java-netbeans mjukvara till PLC hårdvaran med ett användargränssnitt som kan läsa av dataflödet av PLC. Borrstationen styrs av PLC. I detta arbete beskrivs vilka möjliga metoder det finns för att uppnå integrering mellan Java-netbeans och PLC. Arbetets essentiella delar var litteraturstudie, programmering av källkod och programmering av PLC. Detta arbete uppnådde alla målsättningar.
Nuggehally, Mohan A. "Java 3D for UCWaves." University of Cincinnati / OhioLINK, 2002. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1027448463.
Full textBarros, Pedro Loura. "Linguagem concurrent Contract-Java." Master's thesis, Universidade de Aveiro, 2016. http://hdl.handle.net/10773/21754.
Full textResumo não disponivel
The goal of this thesis is the study on the integration of mechanisms from concurrent programming, objected-oriented languages, and Designby- Contract. We propose a new language, Concurrent Contract-Java (CCJava), that's an extension of Contract-Java, a language that has extended Java with Design-by-Contract language mechanisms. CCJava aims to ease object-oriented concurrent programming, ensuring safety (no race conditions will occur) and abstracting away lower level concurrent realizations such as the choice for shared object synchronization schemes. It reuses the semantics of Java mechanisms, together with the semantics of objects and Design-by-Contract constructs, providing simple and expressive language mechanisms for concurrency. CCJava guarantees all aspects of a shared object's concurrent utilization and thread creation, using only two new language keywords: shared, and remote. A compiler was developed implementing the more important language mechanisms, and used as a proof of concept of our proposals
Gudka, Khilan. "Lock inference for Java." Thesis, Imperial College London, 2013. http://hdl.handle.net/10044/1/10945.
Full textNguyen, Vu Carleton University Dissertation Computer Science. "Class firewalls in Java." Ottawa, 1999.
Find full textKienle, Holger M. "A SUIF Java compiler." [S.l.] : Universität Stuttgart , Fakultät Informatik, 1998. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB6783619.
Full textBarbisch, Martin. "Landschaftsvisualisierung mit Java 3D." [S.l. : s.n.], 2002. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB10252201.
Full textAnnavajjala, Karuna. "Java challenge software project." Morgantown, W. Va. : [West Virginia University Libraries], 1999. http://etd.wvu.edu/templates/showETD.cfm?recnum=893.
Full textTitle from document title page. Document formatted into pages; contains viii, 107 p. : ill. (some col.) Vita. Includes abstract. Includes bibliographical references (p. 79-80).
Nuggehally, Mohan. "Java 3D for UCWaves." Cincinnati, Ohio : University of Cincinnati, 2002. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=ucin1027448463.
Full textButler, Simon. "Analysing Java identifier names." Thesis, Open University, 2016. http://oro.open.ac.uk/46653/.
Full textŽamberský, Zdeněk. "Zpětný překladač jazyka Java." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2015. http://www.nusl.cz/ntk/nusl-232034.
Full textTaylor, Kristina Boysen. "A specification language design for the Java Modeling Language (JML) using Java 5 annotations." [Ames, Iowa : Iowa State University], 2008.
Find full textFrederickson, Clint Michael. "Object mapping with Java annotations." Thesis, Montana State University, 2005. http://etd.lib.montana.edu/etd/2005/frederickson/FredericksonC0505.pdf.
Full textStenzel, Kurt. "Verification of Java card programs." [S.l.] : [s.n.], 2005. http://deposit.ddb.de/cgi-bin/dokserv?idn=975584510.
Full textKimmefors, Ann, and Niclas Nilsson. "Kunddatabas i Java och MySQL." Thesis, Linköping University, Department of Computer and Information Science, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2088.
Full textThe purpose with this work that is the basis for this thesis was to help Nattavaara Economical association to develop a program for handling invoices, customer information, and storage. The program and this thesis have been done in cooperation with the economical association in Nattavaara.
Some of the demands on the program are that it shall handle customer information, storage status, invoices and diesel consumption. The program must be able to printout invoices, reminders, delivery notes, a customer list and a storage list. All information will be stored in a database.
The program was implemented in the program language Java and with a MySQL database; since they both are platform independent and we have previous experience using them.
The program is window based and built around the usage of tabbed windows; there every tab represents an own functionality, this to create a foreseeable and easy navigated program. User friendliness is something that has been taken into consideration in the process of developing this program, among other things through grouping of adjacent information and the placement of buttons. One of the conclusions with this work is that Java can with advantage be used to create graphical interfaces with connections to databases.
Further development of the program could be for example to improve the quality of the printouts and the handling of the database initiation.
Liaqat, Ahmad Gull, and Aijaz Ahmad. "Plagiarism Detection in Java Code." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-13231.
Full textIftikhar, Muhammad Usman. "Java Code Transformation for Parallelization." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-13179.
Full textAhern, Alexander Joseph. "Code mobility and Java RMI." Thesis, Imperial College London, 2006. http://hdl.handle.net/10044/1/8700.
Full textBahrami, Azadeh. "Säkerhetssystem för dokumenthantering i Java." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-166604.
Full textThe work carried out during the spring and summer of 1999 at Siemens Elema and covered in this report, aimed to implement security features in a document management system for patient records. The work is based on a test system consisting of an applet or a servlet which basically had the same functionality as the intended document management system (logged in users, downloaded a file from the server, allowing the user to modify the file, and finally saved the file on the server). The following features were implemented: - Secure login with double, strong authentication with certificate system. The logon procedure avoids sending the user's password over the network. - Secure, encrypted data transfer with SSL - Digital signatures that provide positive evidence of a saved document on the server are submitted by a particular user. The whole system was implemented in Java 1.2 with standard components, which is freely available at no cost. The decision to use Java 1.2 as development platform resulted in several problems arose due to security functions in Java 1.2 (later called Java 2) is relatively new, untested and the support for it is not yet fully implemented in the browsers that are most common (Netscape Communicator and InternetExplorer4). This problem is partly solved or can be circumvented and the system can now be installed and run on a standard PC, via a standard Web browser.
Falck, Tomas, and Magnus Quist. "Java Teknologi för mobila enheter." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1705.
Full textThis thesis describes and investigates a technique called JavaTM 2 Micro Edition. Our goal was to show the idea behind J2ME and the negative and positive sides that the technique brings in respect of performance and security. Another goal with the thesis was to investigate the practical usefulness of Java in mobile devices and the consequences that the technique will bring to the mobile infrastructure. J2ME is a platform created for the demands of the fast growing market of embedded devices. This type of devices are smaller than traditional desktop computers which means that they have more physical restrictions in the form of available memory, processing capacity, limited displays and so on. The purpose of the platform is to create an optimised Java-environment for this type of devices. Java-technology in mobile devices means that users, more than before, can influence what the device will be used for. This by downloading applications and run them offline or online on the mobile device. Java is not dependent of the platform that it runs on and the idea is therefore that applications shall be able to run on many different devices as long as they have implemented J2ME. Mobile phones with J2ME technology will soon be available on the Swedish market. This thesis describes possible future applications and the possible suppliers of these applications. Games are expected to dominate the market of MIDlets in the beginning, but we think that different kinds of information services will be the winner in the future. This thesis also shows some shortcomings in the form of portability and security. We have found that J2ME and the profile MIDP are techniques that will play an important role in the development of the mobile Internet. We are convinced that more and more mobile devices will be implemented with Java technology in the future.