Dissertations / Theses on the topic 'Jama ´a'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Jama ´a.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Herrmann, Corey A. "Ceramic analysis of the Tabuchila Complex of the Jama River Valley, Manabi, Ecuador." Thesis, Colorado State University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10241321.
Full textArchaeological excavations by the Proyecto Arqueológico-Paleoetnobotánico Río Jama (PAPRJ) in the Jama River Valley of northern Manabí, Ecuador, have established a cultural chronology spanning over three millennia of prehispanic occupation. One of these occupations, the Tabuchila Complex of the Late Formative Period (1000 – 500 BCE), remains poorly understood. Excavations at three sites in the Jama Valley in the 1990s recovered ceramic, lithic, obsidian, paleobotanical, archaeofaunal, and human skeletal remains from Late Formative Tabuchila contexts, with the goal of orienting Late Formative occupation of the northern Manabí region to its contemporaries in western lowland Ecuador.
This study employs modal ceramic analysis to recognize and catalogue formal and stylistic variation within the recovered Tabuchila ceramic assemblage. Through this analysis the Tabuchila assemblage is compared to other studies of Late Formative Chorrera assemblages to understand how Tabuchila represented a regional variant of and contributor to the formation of the Chorrera ceramic tradition. In addition, a sovereignty-based theoretical approach explores how this ceramic assemblage reflects deeper processes of emergent social complexity and early attempts at establishing inequality in northern Manabí’s regional mound center of San Isidro. Results and discussions of the analysis examine a community connected with its Middle and Late Formative contemporaries across the western lowlands and engaged in feasting activity in the vicinity of the central mound of San Isidro.
Hellqvist, P.-O. "Sufism inom den somaliska diasporan i Göteborg." Thesis, Högskolan i Gävle, Avdelningen för kultur-, religions- och utbildningsvetenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-13895.
Full textJama, Mariel Grace [Verfasser], Wolfram [Akademischer Betreuer] Jaegermann, Georges [Akademischer Betreuer] Hadziioannou, Wolfgang [Akademischer Betreuer] Ensinger, and Robert [Akademischer Betreuer] Stark. "Semiconductor Composites for Solid-State Lighting / Mariel Grace Jama. Betreuer: Wolfram Jaegermann ; Georges Hadziioannou ; Wolfgang Ensinger ; Robert Stark." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2016. http://d-nb.info/1112141715/34.
Full textWong, Kit-ming Leone. "Systematic review on meta-analysis in British Medical Journal, New England Journal of Medicine, the Lancet and JAMA." Click to view the E-thesis via HKUTO, 2002. http://sunzi.lib.hku.hk/hkuto/record/B31970849.
Full textWong, Kit-ming Leone, and 黃潔明. "Systematic review on meta-analysis in British Medical Journal, New England Journal of Medicine, the Lancet and JAMA." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31970849.
Full textAl-Turkistany, Younis B. I. "A critical Hadith study of the Tablighi Nisab and its intellectual impact on the Jama at Al-Tabligh." Thesis, University of Birmingham, 2011. http://etheses.bham.ac.uk//id/eprint/1772/.
Full textHameed, Faissal. "Islamic activisim in South Asia : The reasons for the electoral under-achievement of the Jama At-Islami of Pakistan, 1947-1977." Thesis, University of Birmingham, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.497478.
Full textAhmed, Hilal. "Politics of monuments and memory in postcolonial North India : A study of Muslim political discourse on Jama Masjid and Babri Masjid." Thesis, SOAS, University of London, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.479092.
Full textScharifi, Said Jama [Verfasser], Denys J. [Akademischer Betreuer] Loeffelbein, Klaus-Dietrich [Gutachter] Wolff, and Denys J. [Gutachter] Loeffelbein. "3-dimensionale Effektivitätskontrolle des prächirurgischen Nasoalveolar Moldings bei Lippen-Kiefer-Gaumenspalten / Said Jama Scharifi ; Gutachter: Klaus-Dietrich Wolff, Denys J. Loeffelbein ; Betreuer: Denys J. Loeffelbein." München : Universitätsbibliothek der TU München, 2018. http://d-nb.info/117867214X/34.
Full textJohnson, Earl E., and Keri C. Light. "A Patient-Centered, Provider-Facilitated Approach to the Refinement of Nonlinear Frequency Compression Parameters Based on Subjective Preference Ratings of Amplified Sound Quality." Digital Commons @ East Tennessee State University, 2015. https://doi.org/10.3766/jaaa.14053.
Full textJohnson, Earl E. "A Response Letter to the McCreery et al (2016) Article “Stability of Audiometric Thresholds for Children with Hearing Aids Applying the American Academy of Audiology Pediatric Amplification Guideline: Implications for Safety." Digital Commons @ East Tennessee State University, 2016. https://doi.org/10.3766/jaaa.16048.
Full textNelson, M. Dawn, Faith W. Akin, Kristal M. Riska, Kimberly Andersen, and Stephanie Stamps Mondelli. "Vestibular Assessment and Rehabilitation: Ten-year Survey Trends of Audiologists' Opinions and Practice." Digital Commons @ East Tennessee State University, 2016. https://doi.org/10.3766/jaaa.15035.
Full textŠtefek, Jiří. "Rozhraní pro vzdálený přístup k prostředí MATLAB." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2011. http://www.nusl.cz/ntk/nusl-219296.
Full textGulish, Sarah Anne. "Lessons Learned from Java Jam: An Alternative Music Making Event at the High School Level." Diss., Temple University Libraries, 2014. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/262397.
Full textPh.D.
The purpose of this intrinsic case study was to understand the function and significance of Java Jam--an annual music performance event at a public high school in which students select and rehearse music to perform. Five questions guided the study: How do different groups of Pikeford High School community members view Java Jam? How does Java Jam influence music-making? What are the successes and failures of Java Jam? What are the connections between Java Jam participants and school music? And, how does Java Jam affect the Pikeford High School community? In this study, I provide a detailed description of Java Jam through the perspective of 24 participants representing varied roles among PHS community members: students, teachers, parents, and alumni. The study was bound by both time and place, and data were collected at Pikeford High School during the 2013-2014 school year. Data used in this study consist of personal interviews, a focus group session, observations, and archival data submitted by participants. The research results are presented as both a personal narrative and case description from participant perspectives. This study provides an example of extracurricular alternative music making in which students engage in self-directed learning and peer learning. This study impacts the field of music education in that it demonstrates positive outcomes from an event such as Java Jam, including increased student autonomy, space for musical creativity, and increased confidence among student participants. I present additional implications for the field of music education, music teacher education, and future research to close the study.
Temple University--Theses
Wiarsih, Wiwin. "Empowerment as a way to improve nutrition in pregnancy in Waru Jaya, West Java Indonesia : an action research study /." St. John's, NF : [s.n.], 2002.
Find full textFrancisco, Pedro Filipe do Amaral Goucha. "Contract-Java - design by contract in Java - Contract-Java." Master's thesis, Universidade de Aveiro, 2012. http://hdl.handle.net/10773/11035.
Full textA programação por contrato é uma metodologia de programação que implementa mecanismos de correcção de forma bem adaptada à programação orientada por objectos, facilitando a construção de software correto e robusto, permitindo também a sua documentação e especificação e a construção de programas tolerantes a falhas. No entanto, ao contrário da programação orientada por objectos, a programação por contrato tem uma difusão bastante reduzida. Uma das razões para tal facto é a quase completa ausência de suporte para a metodologia na grande maioria das linguagens de programação usadas actualmente, nas quais se inclui a linguagem Java. Apesar de existirem algumas ferramentas para tentar suprir essa omissão da linguagem Java, são aproximações incompletas que não permitem usufruir de todas as vantagens e capacidades da programação por contrato. Neste trabalho pretende-se definir quais as características necessárias numa linguagem de modo a permitir a implementação completa da metodologia, avaliando as falhas que as ferramentas existentes possuem e, de seguida, definir e construir uma nova linguagem, “Contract-Java”, definida como uma extensão da linguagem Java, que permita usar a programação por contrato na sua totalidade.
Design by Contract is a programming methodology which implements correction mechanisms well adapted to object-oriented programming, easing the construction of correct and robust software, as well as allowing its documentation and specification and the construction of fault-tolerance programs. However, unlike object-oriented programming, Design by Contract has a very low distribution. One of the reasons for such is the lack of support for it on most programming languages currently in use, in which Java is included. Although a few tools attempt to workaround such lack of support, they all present incomplete approaches which do not support all the advantages and capabilities of Design by Contract. In this work, we intend to define which characteristics are necessary in order to fully implement the methodology, evaluating the faults of existing tools and, afterwards, defining and constructing a new language, “Contract-Java”, defined as an extension of the Java language, which allows to use Design by Contract in its entirety.
Drejhammar, Frej. "Flow Java : declarative concurrency for Java." Licentiate thesis, KTH, Microelectronics and Information Technology, IMIT, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-287.
Full textThis thesis presents the design, implementation, and evaluation of Flow Java, a programming language for the implementation of concurrent programs. Flow Java adds powerful programming abstractions for automatic synchronization of concurrent programs to Java. The abstractions added are single assignment variables (logic variables) and futures (read-only views of logic variables).
The added abstractions conservatively extend Java with respect to types, parameter passing, and concurrency. Futures support secure concurrent abstractions and are essential for seamless integration of single assignment variables into Java. These abstractions allow for simple and concise implementation of high-level concurrent programming abstractions.
Flow Java is implemented as a moderate extension to the GNU GCJ/libjava Java compiler and runtime environment. The extension is not speci c to a particular implementation, it could easily be incorporated into other Java implementations.
The thesis presents three implementation strategies for single assignment variables. One strategy uses forwarding and dereferencing while the two others are variants of Taylor's scheme. Taylor's scheme represents logic variables as a circular list. The thesis presents a new adaptation of Taylor's scheme to a concurrent language using operating system threads.
The Flow Java system is evaluated using standard Java benchmarks. Evaluation shows that in most cases the overhead incurred by the extensions is between 10% and 50%. For some pathological cases the runtime increases by up to 150%. Concurrent programs making use of Flow Java's automatic synchronization, generally perform as good as corresponding Java programs. In some cases Flow Java programs outperform Java programs by as much as 33%.
Drejhammar, Frej. "Flow Java : declarative concurrency for Java /." Licentiate thesis, Stockholm : Department of Microelectronics and Information Technology, Royal Institute of Technology, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-287.
Full textKarlovský, Juraj. "Příprava řezů vzorků a jejich analýza metodou SIMS." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2018. http://www.nusl.cz/ntk/nusl-382254.
Full textJacquemart, Nathalie. "Transmission et techniques d'apprentissage d'un savoir traditionnel : étude ethnolinguistique et ethnomusicologique de la musique de Gamelan (Java central)." Paris 5, 1997. http://www.theses.fr/1997PA05H081.
Full textGamelans are traditional javanese music orchestras, essentially composed of metallophones and gongs. They play pure music, accompaniement for dances, shadows and actors theatre. This music plays an essential function in cultural life of central Java: weddings, festivities, competitions, relaxation. The numerous orchestras assemble people from every parts of population. Gamelan takes place in public and private entreprises, district and village associations. Radio, hundred of cassettes, concerts prove population's fancy. Linked to this development, transmission has stronglu evolved. Ciffer notations exist since the beginning of this century. They are used by everyone. The first conservatory of Indonesia was created in Surakarta, by 1950. Lessons are also given, for the numerous amateur groups, by musicians formed or not at school. But we can observe that their pedagogic methodes are very similar. If music tends to be fixed, teachers use, nevertheless, learning methods which permit to preserve richness and diversity of performance. This study brings knowledge on transmission of tradional music (rarely studied), javanese society and culture (music reveals general characteristics of culture), and on specificity of gamelan's musical practices through their present evolution. It has implied crossed investment of linguistics (ethnolinguistic methodology), anthropology (general conception of theme of learning) and ethnomusicology (bring out a system by preferential way of pedagogy, and organology). We can bring out that learning, as subject of study, permits to reach systems, in their structural, historical and sociocultural dimensions
Bwogi, Andrew, and Tuncay Dagdelen. "Configuring Java Pathfinder for concurrent Java programs." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208369.
Full textProgramverifikation är ett datalogiskt fält som säkerställer att pro- gram fungerar enligt en formaliserad specifikation. Modellkontroll är ett delområde i programverifikation som testar alla möjliga tillstånd i ett program för att se om de uppfyller en mängd formaliserade egen- skaper. Java Pathfinder (JPF) är ett verktyg som automatiskt kontrolle- rar bytekod i Java. Syftet med den här rapporten är att undersöka vil- ka generella konfigurationsmönster som finns för särskilda program- typer som leder till att JPF antingen terminerar utan fel eller med ett funnet samverkningsfel. Programtyperna som undersöks är lösningar till producer/consumer-problem, barber shop-problem, reader/wri- ter-problem och program som faller under typen server/klient-pro- gram. Metoden består i huvudsak först av sökning efter program i molnbaserade versionshanteringssystem. Sedan följer programkontroll med hjälp av JPF-dokumentation, artiklar om ämnet och diskussions- grupper online. Resultatet är ett antal konfigurationer som leder till inga fel, fel på grund av samtidig trådkörning och fel på grund av di- rekt körbar kod, beroende på det verifierade programmet. En viktig begränsning med rapporten är frånvaron av stora program som tes- tar JPFs hantering av stora tillståndsrymder. De funna generella kon- figurationerna är tillämpbara på små program som inte använder di- rekt körbar kod. En generell konfiguration hittades även för program som använder direkt körbar kod, men här måste användaren eventu- ellt skriva om en modellklass i JPF.
Zapletal, Aleš. "Podzim jara." Master's thesis, Vysoké učení technické v Brně. Fakulta výtvarných umění, 2015. http://www.nusl.cz/ntk/nusl-232452.
Full textDoyon, Stéphane. "On the security of Java, the Java bytecode verifier." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0004/MQ41890.pdf.
Full textIftikhar, Muhammad Usman. "Java Code Transformation for Parallelization." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-13179.
Full textRomio, Giovanni. "Backport di una applicazione da Java 8 a Java 7." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/10481/.
Full textKwon, Jagun. "Ravenscar-Java: Java Technology for High-Integrity Real-Time Systems." Thesis, University of York, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.485101.
Full textAnders, Jörg. "Java MPEG1-Player." Universitätsbibliothek Chemnitz, 2003. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200300738.
Full textBatchelder, Michael Robert. "Java bytecode obfuscation." Thesis, McGill University, 2007. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=18300.
Full textLes programmes écrits pour l'exécution d'ordinateur seront toujours susceptibles au vol d'information. Cette information peut inclure des algorithmes de marque de commerce, des données incluses dans le programme, ou même des données concernant les accès de programme. Suivant les avancées technologiques, les informaticiens construisent des outils de plus en plus puissants pour l'ingénierie inverse telle que le décompilateur. Le langage de programmation de Java est particulièrement ouvert aux attaques de l'ingénierie inverse en raison de son format binaire bien défini, ouvert, et portatif. Nous recherches portent sur un domaine permettant de mieux sécuriser fixer la propriété intellectuelle des programmes en Java; obscurcissement. L'obscurcissement d'un programme implique de transformer le code du programme en une représentation plus complexe mais sémantiquement équivalente. Ceci peut inclure l'addition de l'écoulement embrouillant de commande, de la supression de certaines informations incluses dans les programmes dont l'exécution n'est pas spécifiquement exigée, ou de la dissimulation des données. Excepté les techniques cryptologique s, l'obscurcissement est l'une des seules techniques disponibles. Même si beaucoup de stratégies de l'obscurissment sont finalement réversibles, il gêne sérieusement ceux qui essayent de voler l'information en augmentant la durée de calcul et la puissance exigées par les logicels d'ingénierie inverse et augmente considérablement la complexité de n'importe quel code source récupere par cette technique. Dans cette thèse nous présentons un certain nombre de transformations d'obscurcissement mises en application dans un outil automatique que nous appelons le Java Bytecode Obfuscator (JBCO). Nous présentons des mesures empiriques des coûts d'exécution de ces transformations en termes de vitesse d'exécution et taille de programme. Des mesures de complexité qui mesurent l'efficacité des obscurc
Bezděk, Pavel. "Gramatická evoluce – Java." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2009. http://www.nusl.cz/ntk/nusl-228412.
Full textFuhrmann, Klaus. "Formen der javanischen Pilgerschaft zu Heiligenschreinen." [S.l. : s.n.], 2000. http://deposit.ddb.de/cgi-bin/dokserv?idn=963866273.
Full textShabani, Shahpar. "Pure Java interface to a DSMS : Pure Java interface to a DSMS." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-423975.
Full textBarbosa, Luiz Antonio Falaguasta. "Uma arquitetura de conectividade de dispositivos móveis na plataforma JAMP." Universidade Federal de São Carlos, 2006. https://repositorio.ufscar.br/handle/ufscar/340.
Full textThis master thesis deals with the involved aspects for the creation of a framework for connectivity in JAMP (Java Architecture for Media Processing). The conception of this framework aims to make possible the use of mobile devices by means of other wireless network technologies. Such technologies, as Bluetooth, used for the publication/localization of services registered in the JBroker, the broker of JAMP Platform developed in Java/RMI, as well as the communication of devices that make use of such technologies through this broker, had been used in the implementation and tests of the framework developed. The implementation aims to access, from devices with Bluetooth network interface, the available remote services in the Internet. These services are requested by mobile devices, such as PDAs, cellular or smartphones, that they consult access points, in Bluetooth communication. The access points consult the JBroker that returns a reference for the service to be consumed. The access points then direct the result to the mobile devices. The experiments developed in this work had been based on scenes where a mobile device, in Bluetooth communication, requests services to a point of access in a PC and this, saw TCP/IP, invokes remote methods in the servers who disponibilizam the services, saw Java/RMI. JAMP already all presented the mechanism of localization of services saw Java/RMI, however it did not present the extension developed with this work, where they had been created one proxy, that it is executed in the access point, and the use of services of the JAMP to break mobile devices that if communicate through technology of different net of TCP/IP. Being thus, its innovation is in the capacity of use of devices that make use of technology of Bluetooth net, being able to be extended to other technologies, without needing would reengeneering previously existing in the architecture.
Esta dissertação de mestrado trata dos aspectos envolvidos para a criação de um framework de conectividade na JAMP (Java Architecture for Media Processing). A concepção desse framework tem por objetivo possibilitar a utilização de dispositivos móveis por meio de outras tecnologias de rede sem fio. Tais tecnologias, como Bluetooth, usadas para a publicação/localização de serviços registrados no JBroker, broker da Plataforma JAMP desenvolvido em Java/RMI, bem como a comunicação de dispositivos que dispõem de tal tecnologia, foram empregadas na implementação e testes do framework desenvolvido. A implementação visa ao acesso, a partir de dispositivos com interface de rede Bluetooth, a serviços remotos disponíveis na Internet. Esses serviços são requisitados por dispositivos móveis, tais como PDAs, celulares ou smartphones, que consultam pontos de acesso, via Bluetooth. Os pontos de acesso consultam o JBroker que retorna uma referência para o serviço a ser consumido. Os pontos de acesso então encaminham o resultado aos dispositivos móveis. Os experimentos desenvolvidos neste trabalho basearam-se no cenário onde um dispositivo móvel, em comunicação Bluetooth, requisita serviços a um ponto de acesso em um PC e este, via TCP/IP, invoca métodos remotos nos servidores que disponibilizam os serviços, via Java/RMI. A JAMP já apresentava todo o mecanismo de localização de serviços via Java/RMI, porém não apresentava a extensão desenvolvida neste trabalho. Nesta, foram criados um proxy, que é executado no ponto de acesso, e a utilização de serviços da JAMP a partir de dispositivos móveis que se comunicam através de tecnologia de rede diferente de TCP/IP. Sendo assim, sua inovação está na capacidade de utilização de dispositivos que dispõem de tecnologia de rede Bluetooth, podendo ser estendido a outras tecnologias, sem necessitar da reengenharia previamente existente na arquitetura
Gatzka, Stephan. "Java in eingebetteten Systemen." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2009. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-20616.
Full textModern, object oriented languages do not play an important role when developing software for embedded systems. There are many reasons for it, most often an inadequate performance and a greater memory demand are mentioned. In spite of the fact that Java has many features suitable for embedded systems, Java often faces the prejudice to consume too much resources in systems with limited processing power and memory. This work is a contribution to diminish this prejudices. It presents techniques to limit the memory demands of a Java Virtual Machine and to effectively cope with limited computing power. Many of the presented methods and algorithms are implemented in the Kertasarie VM, a JVM designed to run in embedded systems.Due to the fact of increasing network capabilities embedded systems often face the problem of a modern, abstract and efficient communication. Therefore the second emphasis of this work is put on the comparison of object oriented middleware architectures, especially Java-RMI. An own implementation for embedded systems is also presented
Klerehag, Peter, and Joakim Lindberg. "Simulerad arbetsmiljö i Java." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-52451.
Full textLiu, Shendun. "Quick Java refactoring tool." Thesis, California State University, Long Beach, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=1524137.
Full textObject Oriented Programming (OOP) is a contemporary favorite method of programming. OOP provides better flexibility, source codes are more organized and systematized, and it enables a group of developers to easily work with each other. Nevertheless, a poorly designed system will not only defeat the intention of coding with OOP, but also will make the software extremely difficult to maintain.
Refactoring is a powerful way to improve existing code. It only changes the structure of the source code without changing its functionality. Manually refactoring larger systems not only consumes large amounts of time and money, but it also happens to be incredibly inaccurate. As a result, quick and easy refactoring with partial automation is extensively discussed in the software realm.
This thesis presents algorithms for implementing nine refactorings that work on the fly for JAVA source code. The refactorings algorithms are implemented in a stepwise manner by initially selecting the source code portion for refactoring, and by choosing the correct refactoring method, and then programmatically changing the selected source code to achieve refactoring.
Naeem, Nomair A. "Programmer-friendly decompiled Java." Thesis, McGill University, 2006. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=101644.
Full textThe work presented can be broken into three major categories: transformations using tree traversals and pattern matching to simplify the control flow, the creation of a flow analysis framework for an Abstract Syntax Tree (AST) representation of Java source code and the implementation of flow analyses with their use in complicated transformations.
The pattern matching transformations rewrite the ASTs to semantically-equivalent ASTs that correspond to code that is easier for programmers to understand. The targeted Java constructs include If and If-Else aggregation, for-loop creation and the removal of abrupt control flow. Pattern matching using tree traversals has its limitations. Thus, we introduce a new structure-based data flow analysis framework that can be used to gather information required by more complex transformations. Popular compiler analyses e.g., reaching definitions, constant propagation etc. were implemented using the framework. Information from these analyses is then leveraged to perform more advanced AST transformations.
We performed experiments comparing different decompiler outputs for different sources of bytecode. The results from these experiments indicate that the new Dava back-end considerably improves code comprehensibility and readability.
Garingo, Gary D. "JAVA based data connectivity." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1997. http://handle.dtic.mil/100.2/ADA342181.
Full text"September 1997." Thesis advisor(s): LuQi, V. Berzins. Includes bibliographical references (p. 63). Also available online.
Long, Bradley. "Testing concurrent Java components /." [St. Lucia, Qld.], 2005. http://www.library.uq.edu.au/pdfserve.php?image=thesisabs/absthe18735.pdf.
Full textManson, Jeremy. "The Java memory model." College Park, Md. : University of Maryland, 2004. http://hdl.handle.net/1903/1949.
Full textThesis research directed by: Computer Science. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Klein, Gerwin. "Verified Java bytecode verification." [S.l. : s.n.], 2003. http://deposit.ddb.de/cgi-bin/dokserv?idn=967128749.
Full textGawetski, Krys. "Java data base connectivity." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape16/PQDD_0013/MQ31577.pdf.
Full textNguyen, Vu. "Class firewalls in Java." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0021/MQ48439.pdf.
Full textBakrim, Rachid. "Les assertions dans Java." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0006/MQ41845.pdf.
Full textParkinson, Matthew John. "Local reasoning for Java." Thesis, University of Cambridge, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.613674.
Full textNuggehally, Mohan. "Java 3D for UCWaves." Cincinnati, Ohio : University of Cincinnati, 2002. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=ucin1027448463.
Full textNguyen, Vu Carleton University Dissertation Computer Science. "Class firewalls in Java." Ottawa, 1999.
Find full textKienle, Holger M. "A SUIF Java compiler." [S.l.] : Universität Stuttgart , Fakultät Informatik, 1998. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB6783619.
Full textBarbisch, Martin. "Landschaftsvisualisierung mit Java 3D." [S.l. : s.n.], 2002. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB10252201.
Full textAnnavajjala, Karuna. "Java challenge software project." Morgantown, W. Va. : [West Virginia University Libraries], 1999. http://etd.wvu.edu/templates/showETD.cfm?recnum=893.
Full textTitle from document title page. Document formatted into pages; contains viii, 107 p. : ill. (some col.) Vita. Includes abstract. Includes bibliographical references (p. 79-80).
Carlstrom, Brian D. (Brian David) 1973. "Embedding scheme in Java." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/16764.
Full textIncludes bibliographical references (p. 171-176).
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Extension languages are an important part of modern applications development. Java as a platform does not provide a standard extension language. Scheme is one possible choice as an extension language for Java. There are a variety of techniques for implementing Scheme in Java varying from interpreting s-expressions to compiling into Java byte-codes. The historical evolution of one implementation is discussed over the course of several years. The design of the Java-to-Scheme and Scheme-to-Java interfaces is reviewed. The advantages and disadvantages of Java and Scheme are compared.
by Brian D. Carlstrom.
M.Eng.