Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/781995dlproceedingsBook PagePublication PagescasconConference Proceedingsconference-collections
CASCON '99: Proceedings of the 1999 conference of the Centre for Advanced Studies on Collaborative research
1999 Proceeding
Publisher:
  • IBM Press
Conference:
Mississauga Ontario Canada November 8 - 11, 1999
Published:
08 November 1999
Sponsors:
IBM Canada, NRC

Reflects downloads up to 26 Sep 2024Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
Article
Free
A model independent source code repository
Page 1

Software repositories, used to support program development and maintenance, invariably require an abstract model of the source code. This requirement restricts the repository user to the analyses and queries supported by the data model of the ...

Article
Free
Multiple-granularity interleaving for piggyback query processing
Page 2

Piggyback query processing is a new technique, described in [24], intended to perform additional useful computation (e.g., database statistics collection) during normal query processing, taking full advantage of data resident in main memory. Different ...

Article
Free
Increasing the flexibility of modelling tools via constraint-based specification
Page 3

Most commercial modelling tools provide support for customising surface features (i.e., visual and, to some extent, interactive behaviour) of a model. Although useful and simple to use, such customisation is typically very limited; for example, one ...

Article
Free
The fused multiply-add instruction leads to algorithms for extended-precision floating point: applications to java and high-performance computing
Page 4

Portability in Java requires that all architectures produce the same result for a particular floating-point calculation. Conceptually, the best defnition for this result is the correctly rounded value of the infinitely precise result. Although this is ...

Article
Free
Software architecture abstraction and aggregation as algebraic manipulations
Page 5

The structure of a large system can be made comprehensible if it can be viewed as a modest number of interacting entities. For example, the 800,000 line Linux kernel can be reasonably viewed as its five top-level interconnected subsystems. Each ...

Article
Free
Leveraging IBM visual age for C++ for reverse engineering tasks
Page 6

The IBM VisualAge for C++ development environment provides tool writers with the ability to query the compiler's internal data structures for information on the programs being compiled. This paper shows how these features can be used to write data ...

Article
Free
A static measure of a subset of intra-procedural data flow testing coverage based on node coverage
Page 7

In the past years, a number of research works, which have been mostly based on pre and post dominator analysis, have been presented about finding subsets of nodes and edges (called "unrestricted subsets") such that their traversal during execution (if ...

Article
Free
Migration of procedural systems to network-centric platforms
Page 8

Technologies developed over the past few years such as CORBA, Java and the Web, have made it easier to build and deploy distributed object applications. These technologies have also made a visible impact on legacy software system evolution.This paper ...

Article
Free
Compact Java binaries for embedded systems
Page 9

Embedded systems bring special purpose computing power to consumer electronics devices such as smartcards, CD players and pagers. Java is being aggressively targeted at such systems with initiatives such as the Java 2 Platform, Micro Edition, which ...

Article
Free
Storage estimation for multidimensional aggregates in OLAP
Page 10

On-line analytical processing (OLAP) is an important technique for analyzing data in decision support systems. Most analytical queries require aggregation of the interesting data. Pre-aggregation is one of the most important techniques used to speed up ...

Article
Free
The specification of distributed objects: liveness and locality
Page 11

There are two aspects to the behavioral specification of an object in a distributed system: safety and liveness. This paper describes our component-based mechanism for specifying liveness. The specification of a distributed object is typically a ...

Article
Free
Forward and reverse repair of software architecture
Page 12

As a software system evolves, it is common for the as-built architecture to diverge from the as-designed architecture. This gap between the as-designed (conceptual) and the as-built (concrete) architecture leads to a false understanding of the system, ...

Article
Free
Soot - a Java bytecode optimization framework
Page 13

This paper presents Soot, a framework for optimizing Java bytecode. The framework is implemented in Java and supports three intermediate representations for representing Java bytecode: Baf, a streamlined representation of bytecode which is simple to ...

Article
Free
Towards array bound check elimination in Java TM virtual machine language
Page 14

In a standard Java implementation, a Java program is compiled into Java bytecode, which is then interpreted by Java virtual machine (JVM). We refer to the bytecode language as Java virtual machine language in this paper. for safety concerns, JVM ...

Contributors
  • University of New Brunswick
  • National Research Council Canada

Index Terms

  1. Proceedings of the 1999 conference of the Centre for Advanced Studies on Collaborative research
      Please enable JavaScript to view thecomments powered by Disqus.

      Recommendations

      Acceptance Rates

      Overall Acceptance Rate 24 of 90 submissions, 27%
      YearSubmittedAcceptedRate
      CASCON '06902427%
      Overall902427%