• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 517
Next 10 →

MiMi: A Java Implementation of the MicroMint Scheme

by Vesna Hassler , Robert Bihlmeyer, Michael Fischer, Manfred Hauswirth - IN PROCEEDINGS OF THE 2ND WORLD CONFERENCE OF THE WWW, INTERNET, AND INTRANET (WEBNET ‘97 , 1997
"... In this paper we describe an experimental implementation of the MicroMint micropayment scheme in Java. We apply this scheme to purchasing Web pages. A prerequisite was to accomplish this without having to change the code of either the Web server or the Web client. We discuss the implementation issue ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
In this paper we describe an experimental implementation of the MicroMint micropayment scheme in Java. We apply this scheme to purchasing Web pages. A prerequisite was to accomplish this without having to change the code of either the Web server or the Web client. We discuss the implementation

Cloning-based context-sensitive pointer alias analysis using binary decision diagrams

by John Whaley, Monica S. Lam - In Proceedings of the ACM SIGPLAN 2004 Conference on Programming Language Design and Implementation , 2004
"... This paper presents the first scalable context-sensitive, inclusionbased pointer alias analysis for Java programs. Our approach to context sensitivity is to create a clone of a method for every context of interest, and run a context-insensitive algorithm over the expanded call graph to get context-s ..."
Abstract - Cited by 311 (16 self) - Add to MetaCart
This paper presents the first scalable context-sensitive, inclusionbased pointer alias analysis for Java programs. Our approach to context sensitivity is to create a clone of a method for every context of interest, and run a context-insensitive algorithm over the expanded call graph to get context

Weka: Practical Machine Learning Tools and Techniques with Java Implementations

by Ian H. Witten, Eibe Frank, Len Trigg, Mark Hall, Geoffrey Holmes, Sally Jo Cunningham , 1999
"... Introduction The Waikato Environment for Knowledge Analysis<E-174> (Weka) is a comprehensive suite of Java class<E-188> libraries that implement many state-of-the-art<E-145> machine learning and data mining algorithms.<E-161> Weka is freely available on the World-Wide Web< ..."
Abstract - Cited by 105 (0 self) - Add to MetaCart
Introduction The Waikato Environment for Knowledge Analysis<E-174> (Weka) is a comprehensive suite of Java class<E-188> libraries that implement many state-of-the-art<E-145> machine learning and data mining algorithms.<E-161> Weka is freely available on the World-Wide Web

MiSFIT: A Tool for Construction Safe Extensible C++ Systems

by Christopher Small, Christopher Small - Third Conference on Object-Oriented Technologies and Systems , 1997
"... The boundary between application and system is becoming increasingly permeable. Extensible applications, such as web browsers, database systems, and operating systems, demonstrate the value of allowing end-users to extend and modify the behavior of what was formerly considered to be a static, inviol ..."
Abstract - Cited by 73 (0 self) - Add to MetaCart
to implement extensions in an unsafe language, such as C++, and the performance of compiled code. MiSFIT, the Minimal i386 Software Fault Isolation Tool, can be used as the central component of a tool set for building safe extensible systems in C++. MiSFIT transforms C++ code, compiled by g++, into safe binary

Kawa: Compiling Scheme to Java

by Per Bothner , 1998
"... Kawa is a set of Java classes useful for implementing dynamic languages, such as those in the Lisp family. Kawa is also an implementation of near-R 5 RS Scheme using these classes, and which compiles Scheme to the bytecode instructions of the Java Virtual Machine. This paper discusses the various ..."
Abstract - Cited by 17 (1 self) - Add to MetaCart
Kawa is a set of Java classes useful for implementing dynamic languages, such as those in the Lisp family. Kawa is also an implementation of near-R 5 RS Scheme using these classes, and which compiles Scheme to the bytecode instructions of the Java Virtual Machine. This paper discusses the various

Embedding Scheme in Java

by Brian D. Carlstrom , 2001
"... Extension languages are an important part of modern applications development. Java as a platform does not provide a standard extension language. Scheme is one possible choice as an extension language for Java. There are a variety of techniques for implementing Scheme in Java varying from interpretin ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Extension languages are an important part of modern applications development. Java as a platform does not provide a standard extension language. Scheme is one possible choice as an extension language for Java. There are a variety of techniques for implementing Scheme in Java varying from

in Java, based on compiling Scheme forms to Java

by unknown authors
"... Kawa started as a Scheme implementation written ..."
Abstract - Add to MetaCart
Kawa started as a Scheme implementation written

Compiling Scheme to JavaScript

by Florian Loitsch, Inria Sophia Antipolis, Manuel Serrano, Inria Sophia Antipolis
"... This paper presents SCM2JS a compiler that translates a variant of the Scheme programming language into JavaScript. On the one hand, some Scheme features are missing, amongst which the most important are the lack of support for continuations, the absence of exact numbers, and a partial treatment of ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
This paper presents SCM2JS a compiler that translates a variant of the Scheme programming language into JavaScript. On the one hand, some Scheme features are missing, amongst which the most important are the lack of support for continuations, the absence of exact numbers, and a partial treatment

A Protection Scheme for Mobile Agents on Java

by D. Hagimont, L. Ismail - IN PROCEEDINGS OF MOBICOM: INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING , 1997
"... This paper describes a protection scheme for mobile agents implemented on a Java environment. In this scheme, access to objects is controlled by means of software capabilities that can be exchanged between mutually suspicious agents. Each agent defines the access control rules that must be enforced ..."
Abstract - Cited by 32 (3 self) - Add to MetaCart
This paper describes a protection scheme for mobile agents implemented on a Java environment. In this scheme, access to objects is controlled by means of software capabilities that can be exchanged between mutually suspicious agents. Each agent defines the access control rules that must be enforced

The design and implementation of an object-oriented toolkit for 3d graphics and visualization

by William J. Schroeder, Kenneth M. Martin, William E. Lorensen - IEEE Visualization , 1996
"... The Visualization Toolkit (vtk) is a freely available C++ class library for 3D graphics and visualization. In this paper we describe core characteristics of the toolkit. This includes a description of object-oriented models for graphics and visualization; methods for synchronizing system execution; ..."
Abstract - Cited by 99 (0 self) - Add to MetaCart
; a summary of data representation schemes; the role of C++; issues in portability across PC and Unix systems; and how we automatically wrap the C++ class library with interpreted languages such as Java and Tcl. We also demonstrate the capabilities of the system for scalar, vector, tensor, and other
Next 10 →
Results 1 - 10 of 517
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University