The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Program verification is a promising approach to improving program quality. To formally verify aspect- oriented programs, we have to find a way to formally specify programs written in aspect-oriented languages. Pipa is a BISL tailored to AspectJ for specifying AspectJ programs. However, Pipa has not provided specification method for pointcuts in AspectJ programs. Based on the exist work of Pipa, and...
Aspect-oriented programming (AOP) provides a way to modularize crosscutting concerns. Crosscuting concerns can be found in various representations of software artifacts and in different steps of software life cycle (e.g., source code, models, requirements, language grammars). This paper provides an introduction to the AspectLISA tool and its aspect-oriented specification language for programming language...
Despite the availability of a variety of program analysis tools, evaluation of these tools is difficult, as only few benchmark suites exist. Existing benchmark suites lack the uniformity needed for automation of experiments. We introduce the design of a uniform build/installation platform, which constitutes an important part of the solution. This platform is used to manage the build and test process,...
Despite the built-in garbage collector, Java programs can still suffer the memory leak problem resulted from the unhealthy programming style of retaining unwanted references. This paper presents an aspect-based tool for assisting programmers in locating such references to fix the problem. This tool, FindLeaks, utilizes an aspect to collect memory consumption statistics and object references created...
Concept location is one of the fundamental activities during software maintenance which locates the parts of the source code where a specific concept is implemented. The methods for concept location include static and dynamic approaches: the former includes string pattern matching, dependence graph search, and IR-based techniques, while the latter includes debugging, profiling, and tracing. Both concept...
Today, we are seeing an increasing number of software applications that users want to use anywhere, anytime. Such mobile applications often deliver their user interfaces (UIs) to client devices over the World Wide Web. However, Web-based UIs cannot provide the same level of usability as window-based UIs on mobile devices with their small screens and occasional network dropouts. To address this challenge,...
With the swift increase of the number of mobile device users, more wireless information services and mobile commerce applications are needed. Since various barcodes have been used for decades as a very effective means in many traditional commerce systems, today people are looking for innovative solutions to use barcodes in the wireless world. Recently, the mobile industry began to pay more attention...
We present a new optimized algorithm of particle system for simulating flame, so that it can be implemented on WinCE platform which has only limited resources. Our approach mainly intends to store some traces first and then load them randomly during the simulation to reduce the computation complexity of the particle system. We have tested this approach in the simulation of a flame, and our method...
Wireless application protocol(WAP) enabled mobile users to enjoy much valuable information and a large number of commercial services over mobile networks. The significance of WAP browsing, which has been a service dedicated to mobile phones, is rising as devices get smarter and networks become faster. A WAP browser would be equally practical on PC's and hand-held devices. This paper presents our research...
Wireless multihop access networks, where clients can access the Internet through Internet gateways by direct or multihop transmissions, are potential for future wireless data services and vehicular network applications. In the context of multihop transmissions, less number of gateways is required for Internet access while a certain level of Internet connectivity still holds. In this paper, we investigate...
A mobile ad hoc network is a multi-path autonomous system comprised of many mobile nodes with wireless transmission capability. In this paper, we first review current research in intrusion detection in ad hoc networks. Then, by considering the characteristics of such networks in which free movement of mobile nodes can lead to frequent topological changes, especially network separation and convergence,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.