To see the other types of publications on this topic, follow the link: Jama ´a.

Dissertations / Theses on the topic 'Jama ´a'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Jama ´a.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Herrmann, Corey A. "Ceramic analysis of the Tabuchila Complex of the Jama River Valley, Manabi, Ecuador." Thesis, Colorado State University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10241321.

Full text
Abstract:

Archaeological excavations by the Proyecto Arqueológico-Paleoetnobotánico Río Jama (PAPRJ) in the Jama River Valley of northern Manabí, Ecuador, have established a cultural chronology spanning over three millennia of prehispanic occupation. One of these occupations, the Tabuchila Complex of the Late Formative Period (1000 – 500 BCE), remains poorly understood. Excavations at three sites in the Jama Valley in the 1990s recovered ceramic, lithic, obsidian, paleobotanical, archaeofaunal, and human skeletal remains from Late Formative Tabuchila contexts, with the goal of orienting Late Formative occupation of the northern Manabí region to its contemporaries in western lowland Ecuador.

This study employs modal ceramic analysis to recognize and catalogue formal and stylistic variation within the recovered Tabuchila ceramic assemblage. Through this analysis the Tabuchila assemblage is compared to other studies of Late Formative Chorrera assemblages to understand how Tabuchila represented a regional variant of and contributor to the formation of the Chorrera ceramic tradition. In addition, a sovereignty-based theoretical approach explores how this ceramic assemblage reflects deeper processes of emergent social complexity and early attempts at establishing inequality in northern Manabí’s regional mound center of San Isidro. Results and discussions of the analysis examine a community connected with its Middle and Late Formative contemporaries across the western lowlands and engaged in feasting activity in the vicinity of the central mound of San Isidro.

APA, Harvard, Vancouver, ISO, and other styles
2

Hellqvist, P.-O. "Sufism inom den somaliska diasporan i Göteborg." Thesis, Högskolan i Gävle, Avdelningen för kultur-, religions- och utbildningsvetenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-13895.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jama, Mariel Grace [Verfasser], Wolfram [Akademischer Betreuer] Jaegermann, Georges [Akademischer Betreuer] Hadziioannou, Wolfgang [Akademischer Betreuer] Ensinger, and Robert [Akademischer Betreuer] Stark. "Semiconductor Composites for Solid-State Lighting / Mariel Grace Jama. Betreuer: Wolfram Jaegermann ; Georges Hadziioannou ; Wolfgang Ensinger ; Robert Stark." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2016. http://d-nb.info/1112141715/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wong, Kit-ming Leone. "Systematic review on meta-analysis in British Medical Journal, New England Journal of Medicine, the Lancet and JAMA." Click to view the E-thesis via HKUTO, 2002. http://sunzi.lib.hku.hk/hkuto/record/B31970849.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wong, Kit-ming Leone, and 黃潔明. "Systematic review on meta-analysis in British Medical Journal, New England Journal of Medicine, the Lancet and JAMA." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31970849.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Al-Turkistany, Younis B. I. "A critical Hadith study of the Tablighi Nisab and its intellectual impact on the Jama at Al-Tabligh." Thesis, University of Birmingham, 2011. http://etheses.bham.ac.uk//id/eprint/1772/.

Full text
Abstract:
It is common knowledge that movements are based on ideologies that are considered to be the foundation of their methodologies and policies. Often, these ideologies are disseminated in letters, books or other publications that present them in the form of texts that are available to the public and become sources of information about these movements. The Jamā‘at Al-Tablīgh is one of the movements that plays an important role in the sphere of Islamic Da‘wah (mission). This movement adopts some techniques of Da‘wah; one of the most important among them being Targhīb, which expounds the merits and benefits of virtuous deeds. This research studies one of the most popular books of the movement, titled in Urdu Tablīghī Nisāb, which uses this sort of technique. It was written by the famous H adīth scholar and the general supervisor of the movement, Shaykh Muhammad Zakariyyā Kāndahlawī. The first publication of the book in Urdu was in (1374 H./1955 CE.). It has been translated into several different languages, and this reflects the importance of the book. The thesis falls into six chapters, including the introduction as chapter one and the conclusion as chapter six. Chapter two talks about the definition of weak Ahadīth and its different types, criteria used to determine weak Ahādīth, different trends among the scholars regarding weak Ahādīth, the consequences of using and publicizing weak and fabricated Ahādīth. Chapter three deals with the biography of the author of the Tablīghī Nisāb, while chapter four focuses on the book itself, by specifying the original name of it and looking at the different editions and translations, and compares the original Urdu with the Arabic and English versions. The chapter also discusses the methodology of the author in his book. Chapter five is a critical study of the Ahādīth of the Tablīghī Nisāb, whether found in the main text of the book or in the commentary to verify the Ahādīth in terms of their authenticity or weakness.
APA, Harvard, Vancouver, ISO, and other styles
7

Hameed, Faissal. "Islamic activisim in South Asia : The reasons for the electoral under-achievement of the Jama At-Islami of Pakistan, 1947-1977." Thesis, University of Birmingham, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.497478.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ahmed, Hilal. "Politics of monuments and memory in postcolonial North India : A study of Muslim political discourse on Jama Masjid and Babri Masjid." Thesis, SOAS, University of London, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.479092.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Scharifi, Said Jama [Verfasser], Denys J. [Akademischer Betreuer] Loeffelbein, Klaus-Dietrich [Gutachter] Wolff, and Denys J. [Gutachter] Loeffelbein. "3-dimensionale Effektivitätskontrolle des prächirurgischen Nasoalveolar Moldings bei Lippen-Kiefer-Gaumenspalten / Said Jama Scharifi ; Gutachter: Klaus-Dietrich Wolff, Denys J. Loeffelbein ; Betreuer: Denys J. Loeffelbein." München : Universitätsbibliothek der TU München, 2018. http://d-nb.info/117867214X/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Johnson, Earl E., and Keri C. Light. "A Patient-Centered, Provider-Facilitated Approach to the Refinement of Nonlinear Frequency Compression Parameters Based on Subjective Preference Ratings of Amplified Sound Quality." Digital Commons @ East Tennessee State University, 2015. https://doi.org/10.3766/jaaa.14053.

Full text
Abstract:
Purpose: To evaluate sound quality preferences of participants wearing hearing aids with different strengths of nonlinear frequency compression (NFC) processing versus no NFC processing. Two analysis methods, one without and one with a qualifier as to the magnitude of preferences, were compared for their percent agreement to differentiate a small difference in perceived sound quality as a result of applied NFC processing. Research Design: A single-blind design was used with participants unaware of the presence or strength of NFC processing (independent variable). The National Acoustic Laboratories-Nonlinear 2 (NAL-NL2) prescription of amplification was chosen because audibility is intentionally not prescribed in the presence of larger sensorineural hearing loss thresholds. A lack of prescribed audibility, when present, was deemed an objective qualifier for NFC. NFC is known to improve the input bandwidth available to listeners when high-frequency audibility is not otherwise available and increasing strengths of NFC were examined. Experimental condition 3 (EC3) was stronger than the manufacturer default (EC2). More aggressive strengths (e.g., EC4 and EC5), however, were expected to include excessive distortion and even reduce the output bandwidth that had been prescribed as audible by NAL-NL2 (EC1). Study Sample: A total of 14 male Veterans with severe high-frequency sensorineural hearing loss. Data Collection and Analysis: Participant sound quality preference ratings (dependent variable) without a qualifier as to the magnitude of preference were analyzed based on binomial probability theory, as is traditional with paired comparison data. The ratings with a qualifier as to the magnitude of preference were analyzed based on the nonparametric statistic of the Wilcoxon signed rank test. Results: The binomial probability analysis method identified a sound quality preference as well as the nonparametric probability test method. As the strength of NFC increased, more participants preferred the EC with less NFC. Fourteen of 14 participants showed equal preference between EC1 and EC2 perhaps, in part, because EC2 showed no objective improvement in audibility for six of the 14 participants (42%). Thirteen of the 14 participants showed no preference between NAL-NL2 and EC3, but all participants had an objective improvement in audibility. With more NFC than EC3, more and more participants preferred the other EC with less NFC in the paired comparison. Conclusions: By referencing the recommended sensation levels of amplitude compression (e.g., NAL-NL2) in the ear canal of hearing aid wearers, the targeting of NFC parameters can likely be optimized with respect to improvements in effective audibility that may contribute to speech recognition without adversely impacting sound quality. After targeting of NFC parameters, providers can facilitate decisions about the use of NFC parameters (strengths of processing) via sound quality preference judgments using paired comparisons.
APA, Harvard, Vancouver, ISO, and other styles
11

Johnson, Earl E. "A Response Letter to the McCreery et al (2016) Article “Stability of Audiometric Thresholds for Children with Hearing Aids Applying the American Academy of Audiology Pediatric Amplification Guideline: Implications for Safety." Digital Commons @ East Tennessee State University, 2016. https://doi.org/10.3766/jaaa.16048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Nelson, M. Dawn, Faith W. Akin, Kristal M. Riska, Kimberly Andersen, and Stephanie Stamps Mondelli. "Vestibular Assessment and Rehabilitation: Ten-year Survey Trends of Audiologists' Opinions and Practice." Digital Commons @ East Tennessee State University, 2016. https://doi.org/10.3766/jaaa.15035.

Full text
Abstract:
Background: The past decade has yielded changes in the education and training of audiologists and technological advancements that have become widely available for clinical balance function testing. It is unclear if recent advancements in vestibular instrumentation or the transition to an AuD degree have affected audiologists’ vestibular clinical practice or opinions.Purpose: The purpose of this study was to examine predominant opinions and practices for vestibular assessment (VA) and vestibular rehabilitation (VR) over the past decade and between master’s- and AuD-level audiologists.Method: A 31-question survey was administered to audiologists via U.S. mail in 2003 (N = 7,500) and electronically in 2014 (N = 9,984) with a response rate of 12% and 10%, respectively.Results: There was an increase in the number of audiologists providing vestibular services in the past decade. Most respondents agreed that audiologists were the most qualified professionals to conduct VA. Less than half of the surveyed audiologists felt that graduate training was adequate for VA. AuD-level audiologists were more satisfied with graduate training and felt more comfortable performing VA compared to master’s-level audiologists. Few respondents agreed that audiologists were the most qualified professionals to conduct VR or that graduate training prepared them to conduct VR. The basic vestibular test battery was unchanged across surveys and included: calorics, smooth pursuit, saccades, search for spontaneous, positional, gaze and optokinetic nystagmus, Dix‐Hallpike, case history, and hearing evaluation. There was a trend toward greater use of air (versus water) calorics, videonystagmography (versus electronystagmography), and additional tests of vestibular and balance function.Conclusions: VA is a growing specialty area in the field of audiology. Better training opportunities are needed to increase audiologists’ knowledge and skills for providing vestibular services. The basic tests performed during VA have remained relatively unchanged over the past 10 yr.
APA, Harvard, Vancouver, ISO, and other styles
13

Štefek, Jiří. "Rozhraní pro vzdálený přístup k prostředí MATLAB." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2011. http://www.nusl.cz/ntk/nusl-219296.

Full text
Abstract:
The goal of this thesis is to analyse communication possibilities between Java programming language and MATLAB enviroment and then to design and implementate a system using this communication. First of all this thesis focuses on overview and comparison of methods accesing MATLAB enviroment. In the next step there is a design of the system that mediates remote computations in MATLAB enviroment using the most effective method from previous step. Next chapter leaves a short description of Spring framework, which is used in implementation of application. The last step folows description of possibilities, instalation and configuration of the system.
APA, Harvard, Vancouver, ISO, and other styles
14

Gulish, Sarah Anne. "Lessons Learned from Java Jam: An Alternative Music Making Event at the High School Level." Diss., Temple University Libraries, 2014. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/262397.

Full text
Abstract:
Music Education
Ph.D.
The purpose of this intrinsic case study was to understand the function and significance of Java Jam--an annual music performance event at a public high school in which students select and rehearse music to perform. Five questions guided the study: How do different groups of Pikeford High School community members view Java Jam? How does Java Jam influence music-making? What are the successes and failures of Java Jam? What are the connections between Java Jam participants and school music? And, how does Java Jam affect the Pikeford High School community? In this study, I provide a detailed description of Java Jam through the perspective of 24 participants representing varied roles among PHS community members: students, teachers, parents, and alumni. The study was bound by both time and place, and data were collected at Pikeford High School during the 2013-2014 school year. Data used in this study consist of personal interviews, a focus group session, observations, and archival data submitted by participants. The research results are presented as both a personal narrative and case description from participant perspectives. This study provides an example of extracurricular alternative music making in which students engage in self-directed learning and peer learning. This study impacts the field of music education in that it demonstrates positive outcomes from an event such as Java Jam, including increased student autonomy, space for musical creativity, and increased confidence among student participants. I present additional implications for the field of music education, music teacher education, and future research to close the study.
Temple University--Theses
APA, Harvard, Vancouver, ISO, and other styles
15

Wiarsih, Wiwin. "Empowerment as a way to improve nutrition in pregnancy in Waru Jaya, West Java Indonesia : an action research study /." St. John's, NF : [s.n.], 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Francisco, Pedro Filipe do Amaral Goucha. "Contract-Java - design by contract in Java - Contract-Java." Master's thesis, Universidade de Aveiro, 2012. http://hdl.handle.net/10773/11035.

Full text
Abstract:
Mestrado em Engenharia de Computadores e Telemática
A programação por contrato é uma metodologia de programação que implementa mecanismos de correcção de forma bem adaptada à programação orientada por objectos, facilitando a construção de software correto e robusto, permitindo também a sua documentação e especificação e a construção de programas tolerantes a falhas. No entanto, ao contrário da programação orientada por objectos, a programação por contrato tem uma difusão bastante reduzida. Uma das razões para tal facto é a quase completa ausência de suporte para a metodologia na grande maioria das linguagens de programação usadas actualmente, nas quais se inclui a linguagem Java. Apesar de existirem algumas ferramentas para tentar suprir essa omissão da linguagem Java, são aproximações incompletas que não permitem usufruir de todas as vantagens e capacidades da programação por contrato. Neste trabalho pretende-se definir quais as características necessárias numa linguagem de modo a permitir a implementação completa da metodologia, avaliando as falhas que as ferramentas existentes possuem e, de seguida, definir e construir uma nova linguagem, “Contract-Java”, definida como uma extensão da linguagem Java, que permita usar a programação por contrato na sua totalidade.
Design by Contract is a programming methodology which implements correction mechanisms well adapted to object-oriented programming, easing the construction of correct and robust software, as well as allowing its documentation and specification and the construction of fault-tolerance programs. However, unlike object-oriented programming, Design by Contract has a very low distribution. One of the reasons for such is the lack of support for it on most programming languages currently in use, in which Java is included. Although a few tools attempt to workaround such lack of support, they all present incomplete approaches which do not support all the advantages and capabilities of Design by Contract. In this work, we intend to define which characteristics are necessary in order to fully implement the methodology, evaluating the faults of existing tools and, afterwards, defining and constructing a new language, “Contract-Java”, defined as an extension of the Java language, which allows to use Design by Contract in its entirety.
APA, Harvard, Vancouver, ISO, and other styles
17

Drejhammar, Frej. "Flow Java : declarative concurrency for Java." Licentiate thesis, KTH, Microelectronics and Information Technology, IMIT, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-287.

Full text
Abstract:

This thesis presents the design, implementation, and evaluation of Flow Java, a programming language for the implementation of concurrent programs. Flow Java adds powerful programming abstractions for automatic synchronization of concurrent programs to Java. The abstractions added are single assignment variables (logic variables) and futures (read-only views of logic variables).

The added abstractions conservatively extend Java with respect to types, parameter passing, and concurrency. Futures support secure concurrent abstractions and are essential for seamless integration of single assignment variables into Java. These abstractions allow for simple and concise implementation of high-level concurrent programming abstractions.

Flow Java is implemented as a moderate extension to the GNU GCJ/libjava Java compiler and runtime environment. The extension is not speci c to a particular implementation, it could easily be incorporated into other Java implementations.

The thesis presents three implementation strategies for single assignment variables. One strategy uses forwarding and dereferencing while the two others are variants of Taylor's scheme. Taylor's scheme represents logic variables as a circular list. The thesis presents a new adaptation of Taylor's scheme to a concurrent language using operating system threads.

The Flow Java system is evaluated using standard Java benchmarks. Evaluation shows that in most cases the overhead incurred by the extensions is between 10% and 50%. For some pathological cases the runtime increases by up to 150%. Concurrent programs making use of Flow Java's automatic synchronization, generally perform as good as corresponding Java programs. In some cases Flow Java programs outperform Java programs by as much as 33%.

APA, Harvard, Vancouver, ISO, and other styles
18

Drejhammar, Frej. "Flow Java : declarative concurrency for Java /." Licentiate thesis, Stockholm : Department of Microelectronics and Information Technology, Royal Institute of Technology, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-287.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Karlovský, Juraj. "Příprava řezů vzorků a jejich analýza metodou SIMS." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2018. http://www.nusl.cz/ntk/nusl-382254.

Full text
Abstract:
This thesis studies possible methods of semiconductor sample measurement by SIMS, with emphasis on testing different measurement parameters and sample preparation. Part of this master thesis deals with the design of a modified sample holder compatible with the used ToF-SIMS$^{5}$ instrument, IONTOF company, which is capable of tilting the sample by defined angle. This holder enables sample preparation in the main chamber of the instrument without the need of transferring the sample between instruments, which limits the probability of sample contamination. This sample holder was tested by ion machining of TIGBT sample edge and by imaging of a crater edge, created in previous measurement. Edge termination structures prepared by different techniques were measured on the TIGBT samples. Further measurements with the goal of optimizing the depth resolution for thin layers were done on Molybdenum-Silicon-multilayer X-Ray Mirror. Part of the measurements was focused on comparing depth profiles measured at low temperatures. For these measurements the samples with Indium multilayers in GaN substrate were used.
APA, Harvard, Vancouver, ISO, and other styles
20

Jacquemart, Nathalie. "Transmission et techniques d'apprentissage d'un savoir traditionnel : étude ethnolinguistique et ethnomusicologique de la musique de Gamelan (Java central)." Paris 5, 1997. http://www.theses.fr/1997PA05H081.

Full text
Abstract:
Les gamelans sont des orchestres de musique traditionnelle javanaise, composés essentiellement de métallophones et de gongs. Ils jouent de la musique pure, accompagnent des danses, le théâtre d'ombres et d'acteurs. Cette musique joue un rôle essentiel dans la vie culturelle de Java Central: mariages, festivités, concours, détente. Les nombreux orchestres rassemblent des gens de tous les milieux. Le gamelan trouve sa place dans les entreprises publiques et privées, les associations de quartier et de village. La radio, les centaines de cassettes, les concerts traduisent l'engouement de la population. Liée à ce développement, la transmission a fortement évolué. Des notations chiffrées existent depuis le début du siècle et sont utilisées par tous. Le premier conservatoire d'Indonésie est ouvert à Surakarta en 1950. Des cours sont aussi donnés, pour les nombreux groupes amateurs, par des musiciens formés ou non en milieu scolaire. Mais on constate que leurs pédagogies sont très semblables. Si la musique tend à se figer, les transmetteurs utilisent néanmoins des procédés d'apprentissage qui permettent de maintenir la richesse et la diversité d'interprétation. Cette étude apporte donc des données sur la transmission d'une musique traditionnelle (rarement étudiée), la société et la culture javanaises - la musique révélant des caractéristiques générales de la culture -, et sur la spécificité des pratiques musicales du gamelan à travers leur évolution actuelle. Elle a impliqué un investissement croisé de la linguistique (utilisation d'une méthodologie ethnolinguistique), de l'anthropologie (conception générale de la thématique de l'apprentissage) et de l'ethnomusicologie (dégagement d'un système par le biais privilégié de la pédagogie, et aussi par l'organologie). On a ainsi pu dégager que l'apprentissage, comme objet d'étude, permettait d'accéder aux systèmes, dans leurs dimensions structurelle, historique et socioculturelle
Gamelans are traditional javanese music orchestras, essentially composed of metallophones and gongs. They play pure music, accompaniement for dances, shadows and actors theatre. This music plays an essential function in cultural life of central Java: weddings, festivities, competitions, relaxation. The numerous orchestras assemble people from every parts of population. Gamelan takes place in public and private entreprises, district and village associations. Radio, hundred of cassettes, concerts prove population's fancy. Linked to this development, transmission has stronglu evolved. Ciffer notations exist since the beginning of this century. They are used by everyone. The first conservatory of Indonesia was created in Surakarta, by 1950. Lessons are also given, for the numerous amateur groups, by musicians formed or not at school. But we can observe that their pedagogic methodes are very similar. If music tends to be fixed, teachers use, nevertheless, learning methods which permit to preserve richness and diversity of performance. This study brings knowledge on transmission of tradional music (rarely studied), javanese society and culture (music reveals general characteristics of culture), and on specificity of gamelan's musical practices through their present evolution. It has implied crossed investment of linguistics (ethnolinguistic methodology), anthropology (general conception of theme of learning) and ethnomusicology (bring out a system by preferential way of pedagogy, and organology). We can bring out that learning, as subject of study, permits to reach systems, in their structural, historical and sociocultural dimensions
APA, Harvard, Vancouver, ISO, and other styles
21

Bwogi, Andrew, and Tuncay Dagdelen. "Configuring Java Pathfinder for concurrent Java programs." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208369.

Full text
Abstract:
Software verification is a field of computer science dedicated to guar- antee that a program runs according to a formalized specification. Of various kinds of verification techniques model checking tries all possi- ble states of a program and makes sure each state satisfies a set of for- malized properties. Java Pathfinder (JPF) is a tool that automatically model checks Java bytecode. This report studies general configuration patterns for JPF that leads it to either terminate without errors or ter- minate with found concurrency bugs for different types of programs. The types considered are solutions to producer-consumer problems, barber shop problems, reader-writer problems and programs falling under the type server-client systems. The main part of the method is first a search for these types of programs using cloud-based revision control systems. Second, these programs are verified with the help of the JPF documentation, articles on the subject and online discus- sion groups. The results are configurations that lead to no errors, con- currency bugs and native method errors depending on the program verified. An important limitation of the report is the absence of large programs that challenge JPF’s state space handling. The resulting gen- eral configuration patterns found are applicable to small programs not using native methods. A pattern is also found for programs with na- tive methods, but here it is possible that the user must modify a model class in JPF.
Programverifikation är ett datalogiskt fält som säkerställer att pro- gram fungerar enligt en formaliserad specifikation. Modellkontroll är ett delområde i programverifikation som testar alla möjliga tillstånd i ett program för att se om de uppfyller en mängd formaliserade egen- skaper. Java Pathfinder (JPF) är ett verktyg som automatiskt kontrolle- rar bytekod i Java. Syftet med den här rapporten är att undersöka vil- ka generella konfigurationsmönster som finns för särskilda program- typer som leder till att JPF antingen terminerar utan fel eller med ett funnet samverkningsfel. Programtyperna som undersöks är lösningar till producer/consumer-problem, barber shop-problem, reader/wri- ter-problem och program som faller under typen server/klient-pro- gram. Metoden består i huvudsak först av sökning efter program i molnbaserade versionshanteringssystem. Sedan följer programkontroll med hjälp av JPF-dokumentation, artiklar om ämnet och diskussions- grupper online. Resultatet är ett antal konfigurationer som leder till inga fel, fel på grund av samtidig trådkörning och fel på grund av di- rekt körbar kod, beroende på det verifierade programmet. En viktig begränsning med rapporten är frånvaron av stora program som tes- tar JPFs hantering av stora tillståndsrymder. De funna generella kon- figurationerna är tillämpbara på små program som inte använder di- rekt körbar kod. En generell konfiguration hittades även för program som använder direkt körbar kod, men här måste användaren eventu- ellt skriva om en modellklass i JPF.
APA, Harvard, Vancouver, ISO, and other styles
22

Zapletal, Aleš. "Podzim jara." Master's thesis, Vysoké učení technické v Brně. Fakulta výtvarných umění, 2015. http://www.nusl.cz/ntk/nusl-232452.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Doyon, Stéphane. "On the security of Java, the Java bytecode verifier." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0004/MQ41890.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Iftikhar, Muhammad Usman. "Java Code Transformation for Parallelization." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-13179.

Full text
Abstract:
This thesis describes techniques for defining independent tasks in Java programs forparallelization. Existing Java parallelization APIs like JOMP, Parallel Java,Deterministic Parallel Java, JConqurr and JaMP are discussed. We have seen that JaMPis an implementation of OpenMP for Java, and it has a set of OpenMP directives andruntime library functions. We have discussed that JaMP has source to byte codecompiler, and it does not help in debugging the parallel source codes. There is no designtime syntax checking support of JaMP directives, and we know about mistakes onlywhen we compile the source code with JaMP compiler. So we have decided tocontribute JaMP with adding an option in the compiler to get parallel source code. Wehave created an eclipse plug-in to support design time syntax checking of JaMPdirectives too. It also helps the programmers to get quickly parallel source code withjust one click instead of using shell commands with JaMP compiler.
APA, Harvard, Vancouver, ISO, and other styles
25

Romio, Giovanni. "Backport di una applicazione da Java 8 a Java 7." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/10481/.

Full text
Abstract:
In Java 8, ultimo aggiornamento ufficiale del linguaggio Java, sono state introdotte alcune nuove funzionalità che permettono l’integrazione di alcuni meccanismi legati ai linguaggi dinamici o funzionali, come le espressioni lambda, l’utilizzo degli stream e la dichiarazione di metodi statici all’interno di interfacce. Se si volesse installare un’applicazione scritta in Java 8 su Android, Dalvik VM, la JVM in esso presente, fallirà il processo di traduzione del bytecode. In questa tesi quindi esplorerò, sia ad alto livello che a basso livello, l’origine del problema e presenterò una soluzione di backporting per un’applicazione esistente.
APA, Harvard, Vancouver, ISO, and other styles
26

Kwon, Jagun. "Ravenscar-Java: Java Technology for High-Integrity Real-Time Systems." Thesis, University of York, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.485101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Anders, Jörg. "Java MPEG1-Player." Universitätsbibliothek Chemnitz, 2003. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200300738.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Batchelder, Michael Robert. "Java bytecode obfuscation." Thesis, McGill University, 2007. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=18300.

Full text
Abstract:
Programs written for machine execution will always be susceptible to information theft. This information can include trademarked algorithms, data embedded in the program, or even data the program accesses. As technology advances computer scientists are building more and more powerful tools for reverse-engineering such as decompilers.The Java programming language is particularly open to reverse-engineering attacks because of its well-defined, open, and portable binary format. We examine one area of better-securing the intellectual property of a Java program; obfuscation. Obfuscation of a program involves transforming the code of the program into a more complex, but semantically equivalent representation. This can include the addition of confusing control flow, the removal of certain information embedded in the program which is not explicitly required for execution, or the cloaking of data.Obfuscation is one of the only techniques available other than cryptological options. While many approaches to obfuscation are ultimately reversible, it nevertheless seriously hinders those attempting to steal information by increasing the computing time and power required by software to reverse-engineer the program and also severely increases the complexity of any source code that is recovered by the reverse-engineering.In this thesis we present a number of obfuscating transformations implemented within a new automatic tool we name the Java Bytecode Obfuscator (JBCO). We present empirical measures of the performance costs of these transformations in terms of execution speed and program size. Complexity measurements that gauge the effectiveness of the obfuscations are also given. Finally, we review the feasibility of each transformation by looking at source code generated from obfuscated bytecode by various decompilers.
Les programmes écrits pour l'exécution d'ordinateur seront toujours susceptibles au vol d'information. Cette information peut inclure des algorithmes de marque de commerce, des données incluses dans le programme, ou même des données concernant les accès de programme. Suivant les avancées technologiques, les informaticiens construisent des outils de plus en plus puissants pour l'ingénierie inverse telle que le décompilateur. Le langage de programmation de Java est particulièrement ouvert aux attaques de l'ingénierie inverse en raison de son format binaire bien défini, ouvert, et portatif. Nous recherches portent sur un domaine permettant de mieux sécuriser fixer la propriété intellectuelle des programmes en Java; obscurcissement. L'obscurcissement d'un programme implique de transformer le code du programme en une représentation plus complexe mais sémantiquement équivalente. Ceci peut inclure l'addition de l'écoulement embrouillant de commande, de la supression de certaines informations incluses dans les programmes dont l'exécution n'est pas spécifiquement exigée, ou de la dissimulation des données. Excepté les techniques cryptologique s, l'obscurcissement est l'une des seules techniques disponibles. Même si beaucoup de stratégies de l'obscurissment sont finalement réversibles, il gêne sérieusement ceux qui essayent de voler l'information en augmentant la durée de calcul et la puissance exigées par les logicels d'ingénierie inverse et augmente considérablement la complexité de n'importe quel code source récupere par cette technique. Dans cette thèse nous présentons un certain nombre de transformations d'obscurcissement mises en application dans un outil automatique que nous appelons le Java Bytecode Obfuscator (JBCO). Nous présentons des mesures empiriques des coûts d'exécution de ces transformations en termes de vitesse d'exécution et taille de programme. Des mesures de complexité qui mesurent l'efficacité des obscurc
APA, Harvard, Vancouver, ISO, and other styles
29

Bezděk, Pavel. "Gramatická evoluce – Java." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2009. http://www.nusl.cz/ntk/nusl-228412.

Full text
Abstract:
The object of my thesis is the realization of grammatical evolution in the Java programming language for solving problems of approximation of functions and synthesis of logical circuits. The application is practical used for testing and gathering data in context of using different purpose function and parallel grammatical evolution. The data are analyzed and evaluated.
APA, Harvard, Vancouver, ISO, and other styles
30

Fuhrmann, Klaus. "Formen der javanischen Pilgerschaft zu Heiligenschreinen." [S.l. : s.n.], 2000. http://deposit.ddb.de/cgi-bin/dokserv?idn=963866273.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Shabani, Shahpar. "Pure Java interface to a DSMS : Pure Java interface to a DSMS." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-423975.

Full text
Abstract:
SCSQ (Scalable Stream Query processor) is a data stream management system (DSMS) that allows different kinds of distributed high-volume infinite streams to be queried. The current Java interface to SCSQ usesC libraries to communicate between Java and a SCSQ server. Therefore, a pure Java client-server interface to SCSQ is needed. Unlike regular databases, DSMS can process queries over infinite streams. Such continuous queries (CQs) are running until they are explicitlyterminated. The interface must be able to process infinite scans of continuous query results. This master thesis implements a pure Java client-server interface to SCSQ which can handle CQs.
APA, Harvard, Vancouver, ISO, and other styles
32

Barbosa, Luiz Antonio Falaguasta. "Uma arquitetura de conectividade de dispositivos móveis na plataforma JAMP." Universidade Federal de São Carlos, 2006. https://repositorio.ufscar.br/handle/ufscar/340.

Full text
Abstract:
Made available in DSpace on 2016-06-02T19:05:23Z (GMT). No. of bitstreams: 1 DissLAFB.pdf: 1617842 bytes, checksum: 0e04147b28caae9983df30e2b3a878bd (MD5) Previous issue date: 2006-12-14
This master thesis deals with the involved aspects for the creation of a framework for connectivity in JAMP (Java Architecture for Media Processing). The conception of this framework aims to make possible the use of mobile devices by means of other wireless network technologies. Such technologies, as Bluetooth, used for the publication/localization of services registered in the JBroker, the broker of JAMP Platform developed in Java/RMI, as well as the communication of devices that make use of such technologies through this broker, had been used in the implementation and tests of the framework developed. The implementation aims to access, from devices with Bluetooth network interface, the available remote services in the Internet. These services are requested by mobile devices, such as PDAs, cellular or smartphones, that they consult access points, in Bluetooth communication. The access points consult the JBroker that returns a reference for the service to be consumed. The access points then direct the result to the mobile devices. The experiments developed in this work had been based on scenes where a mobile device, in Bluetooth communication, requests services to a point of access in a PC and this, saw TCP/IP, invokes remote methods in the servers who disponibilizam the services, saw Java/RMI. JAMP already all presented the mechanism of localization of services saw Java/RMI, however it did not present the extension developed with this work, where they had been created one proxy, that it is executed in the access point, and the use of services of the JAMP to break mobile devices that if communicate through technology of different net of TCP/IP. Being thus, its innovation is in the capacity of use of devices that make use of technology of Bluetooth net, being able to be extended to other technologies, without needing would reengeneering previously existing in the architecture.
Esta dissertação de mestrado trata dos aspectos envolvidos para a criação de um framework de conectividade na JAMP (Java Architecture for Media Processing). A concepção desse framework tem por objetivo possibilitar a utilização de dispositivos móveis por meio de outras tecnologias de rede sem fio. Tais tecnologias, como Bluetooth, usadas para a publicação/localização de serviços registrados no JBroker, broker da Plataforma JAMP desenvolvido em Java/RMI, bem como a comunicação de dispositivos que dispõem de tal tecnologia, foram empregadas na implementação e testes do framework desenvolvido. A implementação visa ao acesso, a partir de dispositivos com interface de rede Bluetooth, a serviços remotos disponíveis na Internet. Esses serviços são requisitados por dispositivos móveis, tais como PDAs, celulares ou smartphones, que consultam pontos de acesso, via Bluetooth. Os pontos de acesso consultam o JBroker que retorna uma referência para o serviço a ser consumido. Os pontos de acesso então encaminham o resultado aos dispositivos móveis. Os experimentos desenvolvidos neste trabalho basearam-se no cenário onde um dispositivo móvel, em comunicação Bluetooth, requisita serviços a um ponto de acesso em um PC e este, via TCP/IP, invoca métodos remotos nos servidores que disponibilizam os serviços, via Java/RMI. A JAMP já apresentava todo o mecanismo de localização de serviços via Java/RMI, porém não apresentava a extensão desenvolvida neste trabalho. Nesta, foram criados um proxy, que é executado no ponto de acesso, e a utilização de serviços da JAMP a partir de dispositivos móveis que se comunicam através de tecnologia de rede diferente de TCP/IP. Sendo assim, sua inovação está na capacidade de utilização de dispositivos que dispõem de tecnologia de rede Bluetooth, podendo ser estendido a outras tecnologias, sem necessitar da reengenharia previamente existente na arquitetura
APA, Harvard, Vancouver, ISO, and other styles
33

Gatzka, Stephan. "Java in eingebetteten Systemen." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2009. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-20616.

Full text
Abstract:
Moderne, objektorientierte Sprachen spielen bei der Entwicklung von Software für eingebettete Systeme bislang kaum eine Rolle. Die Gründe hierfür sind vielfältig, meist wird jedoch die mangelnde Effizienz und der größere Speicherbedarf hervorgehoben. Obwohl Java viele Eigenschaften hat, die sehr für einen Einsatz in eingebetteten Systemen sprechen, so hängt doch gerade Java vielfach immer noch das Vorurteil an, in Systemen mit beschränkter Rechenleistung und Speicher zu viele Ressourcen zu benötigen. Diese Arbeit soll dazu beitragen, diese Vorurteile abzutragen. Sie stellt insbesondere Techniken vor, die den Speicherbedarf einer JVM so gering wie möglich halten und diese effizient mit der zur Verfügung stehenden Rechenleistung umgehen lassen. Viele der dargestellten Verfahren und Algorithmen wurden in der Kertasarie VM implementiert, einer virtuellen Maschine, die speziell für den Einsatz in eingebetteten Systemen konzipiert wurde. Durch die weit verbreitete Vernetzung eingebetteter Systeme über das Internet stellt sich in vielen Fällen zudem das Problem einer modernen, abstrakten und effizienten Form der Kommunikation. Aus diesem Grund liegt der zweite Schwerpunkt dieser Arbeit auf dem Vergleich von objektorientierten Middleware-Architekturen, insbesondere von Java-RMI. Auch auf diesem Gebiet wird eine eigene, speziell an eingebettete Systeme angepasste RMI-Variante vorgestellt
Modern, object oriented languages do not play an important role when developing software for embedded systems. There are many reasons for it, most often an inadequate performance and a greater memory demand are mentioned. In spite of the fact that Java has many features suitable for embedded systems, Java often faces the prejudice to consume too much resources in systems with limited processing power and memory. This work is a contribution to diminish this prejudices. It presents techniques to limit the memory demands of a Java Virtual Machine and to effectively cope with limited computing power. Many of the presented methods and algorithms are implemented in the Kertasarie VM, a JVM designed to run in embedded systems.Due to the fact of increasing network capabilities embedded systems often face the problem of a modern, abstract and efficient communication. Therefore the second emphasis of this work is put on the comparison of object oriented middleware architectures, especially Java-RMI. An own implementation for embedded systems is also presented
APA, Harvard, Vancouver, ISO, and other styles
34

Klerehag, Peter, and Joakim Lindberg. "Simulerad arbetsmiljö i Java." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-52451.

Full text
Abstract:
Hur olika människor lär sig nya kunskaper är högst individuellt, vissa kanske vill lyssna på musik medan vissa behöver absolut tystnad. Det som dock är gemensamt för alla är att det som behövs för att främja lärande är en stressfri miljö där eleven känner sig säker. En lagermiljö är ofta väldigt stressig och påfrestande och är inte en optimal plats för utbildning. En anställd på ICAs lager i Hacksta Västerås skall på en väldigt begränsad tid lära sig att köra truck, packa varor samt hantera ett komplicerat system. Upplärning i denna stressade miljö leder till osäkerhet och större risk för att göra fel. Ett sätt att effektivisera sättet en nyanställd lär sig på är att flytta ut de delar av upplärningen som går till ett klassrum. En virtuell lärandemiljö är ett väldigt bra hjälpmedel för att låta en användare testa och använda ett system i en säker och stängd miljö för att minska antalet fel som uppstår just till följd av osäkerhet. Denna rapport ämnar beskriva skapandet av just en sådan säker miljö för ICA AB i Västerås. För att lösa denna uppgift jämförs och diskuteras diverse tekniker som kan behöva användas för att kunna göra en så noggrann efterliknelse av det befintliga LS som möjligt samt förenkla vidareutveckling dvs. ge lösningen en bra struktur. Rapporten diskuterar också hur man kan bygga en bra struktur för applikationen. Resultatet av arbetet är en färdig produkt som är tänkt att användas vid upplärningen av ny anställda på lagret och som ska vara lätt att bygga vidare på. Den slutsats vi kan dra från detta är att ett objektorienterat språk som kan delas upp I paket är en väldigt bra lösning och en ren applikation med tydliga avgränsningar av vad som är simulerat och vad som är det faktiska programmet gav ett väldigt bra resultat. Applikationen som skapades kommer att vara ett väldigt bra hjälpmedel för de nya expeditörerna som kommer i framtiden
APA, Harvard, Vancouver, ISO, and other styles
35

Liu, Shendun. "Quick Java refactoring tool." Thesis, California State University, Long Beach, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=1524137.

Full text
Abstract:

Object Oriented Programming (OOP) is a contemporary favorite method of programming. OOP provides better flexibility, source codes are more organized and systematized, and it enables a group of developers to easily work with each other. Nevertheless, a poorly designed system will not only defeat the intention of coding with OOP, but also will make the software extremely difficult to maintain.

Refactoring is a powerful way to improve existing code. It only changes the structure of the source code without changing its functionality. Manually refactoring larger systems not only consumes large amounts of time and money, but it also happens to be incredibly inaccurate. As a result, quick and easy refactoring with partial automation is extensively discussed in the software realm.

This thesis presents algorithms for implementing nine refactorings that work on the fly for JAVA source code. The refactorings algorithms are implemented in a stepwise manner by initially selecting the source code portion for refactoring, and by choosing the correct refactoring method, and then programmatically changing the selected source code to achieve refactoring.

APA, Harvard, Vancouver, ISO, and other styles
36

Naeem, Nomair A. "Programmer-friendly decompiled Java." Thesis, McGill University, 2006. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=101644.

Full text
Abstract:
Java decompilers convert Java class files to Java source. Common Java decompilers are javac-specific decompilers since they target bytecode produced from a particular javac compiler. We present work carried out on Dava, a tool-independent decompiler that decompiles bytecode produced from any compiler. A known deficiency of tool-independent decompilers is the generation of complicated decompiled Java source which does not resemble the original source as closely as output produced by javac-specific decompilers. This thesis tackles this short-coming, for Dava, by introducing a new back-end consisting of simplifying transformations.
The work presented can be broken into three major categories: transformations using tree traversals and pattern matching to simplify the control flow, the creation of a flow analysis framework for an Abstract Syntax Tree (AST) representation of Java source code and the implementation of flow analyses with their use in complicated transformations.
The pattern matching transformations rewrite the ASTs to semantically-equivalent ASTs that correspond to code that is easier for programmers to understand. The targeted Java constructs include If and If-Else aggregation, for-loop creation and the removal of abrupt control flow. Pattern matching using tree traversals has its limitations. Thus, we introduce a new structure-based data flow analysis framework that can be used to gather information required by more complex transformations. Popular compiler analyses e.g., reaching definitions, constant propagation etc. were implemented using the framework. Information from these analyses is then leveraged to perform more advanced AST transformations.
We performed experiments comparing different decompiler outputs for different sources of bytecode. The results from these experiments indicate that the new Dava back-end considerably improves code comprehensibility and readability.
APA, Harvard, Vancouver, ISO, and other styles
37

Garingo, Gary D. "JAVA based data connectivity." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1997. http://handle.dtic.mil/100.2/ADA342181.

Full text
Abstract:
Thesis (M.S. in Software Engineering) Naval Postgraduate School, September 1997.
"September 1997." Thesis advisor(s): LuQi, V. Berzins. Includes bibliographical references (p. 63). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
38

Long, Bradley. "Testing concurrent Java components /." [St. Lucia, Qld.], 2005. http://www.library.uq.edu.au/pdfserve.php?image=thesisabs/absthe18735.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Manson, Jeremy. "The Java memory model." College Park, Md. : University of Maryland, 2004. http://hdl.handle.net/1903/1949.

Full text
Abstract:
Thesis (Ph. D.) -- University of Maryland, College Park, 2004.
Thesis research directed by: Computer Science. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
40

Klein, Gerwin. "Verified Java bytecode verification." [S.l. : s.n.], 2003. http://deposit.ddb.de/cgi-bin/dokserv?idn=967128749.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Gawetski, Krys. "Java data base connectivity." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape16/PQDD_0013/MQ31577.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Nguyen, Vu. "Class firewalls in Java." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0021/MQ48439.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Bakrim, Rachid. "Les assertions dans Java." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0006/MQ41845.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Parkinson, Matthew John. "Local reasoning for Java." Thesis, University of Cambridge, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.613674.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Nuggehally, Mohan. "Java 3D for UCWaves." Cincinnati, Ohio : University of Cincinnati, 2002. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=ucin1027448463.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Nguyen, Vu Carleton University Dissertation Computer Science. "Class firewalls in Java." Ottawa, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Kienle, Holger M. "A SUIF Java compiler." [S.l.] : Universität Stuttgart , Fakultät Informatik, 1998. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB6783619.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Barbisch, Martin. "Landschaftsvisualisierung mit Java 3D." [S.l. : s.n.], 2002. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB10252201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Annavajjala, Karuna. "Java challenge software project." Morgantown, W. Va. : [West Virginia University Libraries], 1999. http://etd.wvu.edu/templates/showETD.cfm?recnum=893.

Full text
Abstract:
Thesis (M.S.)--West Virginia University, 1999.
Title from document title page. Document formatted into pages; contains viii, 107 p. : ill. (some col.) Vita. Includes abstract. Includes bibliographical references (p. 79-80).
APA, Harvard, Vancouver, ISO, and other styles
50

Carlstrom, Brian D. (Brian David) 1973. "Embedding scheme in Java." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/16764.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, February 2001.
Includes bibliographical references (p. 171-176).
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Extension languages are an important part of modern applications development. Java as a platform does not provide a standard extension language. Scheme is one possible choice as an extension language for Java. There are a variety of techniques for implementing Scheme in Java varying from interpreting s-expressions to compiling into Java byte-codes. The historical evolution of one implementation is discussed over the course of several years. The design of the Java-to-Scheme and Scheme-to-Java interfaces is reviewed. The advantages and disadvantages of Java and Scheme are compared.
by Brian D. Carlstrom.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography