981 resultados para Java Card


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Java 8, ultimo aggiornamento ufficiale del linguaggio Java, sono state introdotte alcune nuove funzionalità che permettono l’integrazione di alcuni meccanismi legati ai linguaggi dinamici o funzionali, come le espressioni lambda, l’utilizzo degli stream e la dichiarazione di metodi statici all’interno di interfacce. Se si volesse installare un’applicazione scritta in Java 8 su Android, Dalvik VM, la JVM in esso presente, fallirà il processo di traduzione del bytecode. In questa tesi quindi esplorerò, sia ad alto livello che a basso livello, l’origine del problema e presenterò una soluzione di backporting per un’applicazione esistente.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Java Enterprise Applications (JEAs) are large systems that integrate multiple technologies and programming languages. Transactions in JEAs simplify the development of code that deals with failure recovery and multi-user coordination by guaranteeing atomicity of sets of operations. The heterogeneous nature of JEAs, however, can obfuscate conceptual errors in the application code, and in particular can hide incorrect declarations of transaction scope. In this paper we present a technique to expose and analyze the application transaction scope in JEAs by merging and analyzing information from multiple sources. We also present several novel visualizations that aid in the analysis of transaction scope by highlighting anomalies in the specification of transactions and violations of architectural constraints. We have validated our approach on two versions of a large commercial case study.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

After decades of development in programming languages and programming environments, Smalltalk is still one of few environments that provide advanced features and is still widely used in the industry. However, as Java became prevalent, the ability to call Java code from Smalltalk and vice versa becomes important. Traditional approaches to integrate the Java and Smalltalk languages are through low-level communication between separate Java and Smalltalk virtual machines. We are not aware of any attempt to execute and integrate the Java language directly in the Smalltalk environment. A direct integration allows for very tight and almost seamless integration of the languages and their objects within a single environment. Yet integration and language interoperability impose challenging issues related to method naming conventions, method overloading, exception handling and thread-locking mechanisms. In this paper we describe ways to overcome these challenges and to integrate Java into the Smalltalk environment. Using techniques described in this paper, the programmer can call Java code from Smalltalk using standard Smalltalk idioms while the semantics of each language remains preserved. We present STX:LIBJAVA - an implementation of Java virtual machine within Smalltalk/X - as a validation of our approach

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ninety strains of a collection of well-identified clinical isolates of gram-negative nonfermentative rods collected over a period of 5 years were evaluated using the new colorimetric VITEK 2 card. The VITEK 2 colorimetric system identified 53 (59%) of the isolates to the species level and 9 (10%) to the genus level; 28 (31%) isolates were misidentified. An algorithm combining the colorimetric VITEK 2 card and 16S rRNA gene sequencing for adequate identification of gram-negative nonfermentative rods was developed. According to this algorithm, any identification by the colorimetric VITEK 2 card other than Achromobacter xylosoxidans, Acinetobacter sp., Burkholderia cepacia complex, Pseudomonas aeruginosa, and Stenotrophomonas maltophilia should be subjected to 16S rRNA gene sequencing when accurate identification of nonfermentative rods is of concern.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With today's prevalence of Internet-connected systems storing sensitive data and the omnipresent threat of technically skilled malicious users, computer security remains a critically important field. Because of today's multitude of vulnerable systems and security threats, it is vital that computer science students be taught techniques for programming secure systems, especially since many of them will work on systems with sensitive data after graduation. Teaching computer science students proper design, implementation, and maintenance of secure systems is a challenging task that calls for the use of novel pedagogical tools. This report describes the implementation of a compiler that converts mandatory access control specification Domain-Type Enforcement Language to the Java Security Manager, primarily for pedagogical purposes. The implementation of the Java Security Manager was explored in depth, and various techniques to work around its inherent limitations were explored and partially implemented, although some of these workarounds do not appear in the current version of the compiler because they would have compromised cross-platform compatibility. The current version of the compiler and implementation details of the Java Security Manager are discussed in depth.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Java Enterprise Applications (JEAs) are complex systems composed using various technologies that in turn rely on languages other than Java, such as XML or SQL. Given the complexity of these applications, the need to reverse engineer them in order to support further development becomes critical. In this paper we show how it is possible to split a system into layers and how is possible to interpret the distance between application elements in order to support the refactoring of JEAs. The purpose of this paper is to explore ways to provide suggestions about the refactoring operations to perform on the code by evaluating the distance between layers and elements belonging those layers. We split JEAs into layers by considering the kinds and the purposes of the elements composing the application. We measure distance between elements by using the notion of the shortest path in a graph. Also we present how to enrich the interpretation of the distance value with enterprise pattern detection in order to refine the suggestion about modifications to perform on the code.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Increasingly, families referred for Intensive Family Preservation Services have not experienced a crisis of maltreatment, focused on the parent; rather these families have children with chronic behavioral difficulties for which their parents lack the skills to cope. These are the same families whose children were formerly placed in residential programs. This paper presents The Family Partners Credit Card System, incorporating behavioral techniques developed to treat children in out-of-home placements into a family preservation model. Two case examples illustrate how the system has been modified to train biological or adoptive parents in parenting skills, enable them to teach their children pro-family behaviors, and reinforce new behaviors through a credit card that monitors an ongoing balance of credits and fines.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

W. Reuschenbach

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Safety in Numbers It’s been eight months since we implemented UHC Patient Safety Net® (“PSN”) at John Dempsey Hospital, and we are delighted with its success. As you know, PSN is a web-based reporting tool for reporting patient safety-related events. Frontline staff are doing a great job entering data on patient care events. Here’s how PSN works:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

von Dr. R. Teuscher