找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: ECOOP 2009 -- Object-Oriented Programming; 23rd European Confer Sophia Drossopoulou Conference proceedings 2009 Springer-Verlag Berlin Heid

[复制链接]
楼主: industrious
发表于 2025-3-30 09:56:59 | 显示全部楼层
Program Metamorphosisare limited in three ways: (i) atomicity forces transformations to be complex and opaque, (ii) the behaviour preservation requirement disallows deliberate behaviour evolution, and (iii) atomicity limits code reuse opportunities for refactoring implementers..We present ‘program metamorphosis’, a nove
发表于 2025-3-30 14:29:48 | 显示全部楼层
From Public to Private to Absent: Refactoring , Programs under Constrained Accessibilitye tools provide hints that referenced elements may become inaccessible due to the intended restructuring, none we have tested prevent changes that alter the meaning of a program, and none take steps that counteract such alterations. To address these problems, we formalize accessibility in . as a set
发表于 2025-3-30 19:05:06 | 显示全部楼层
Implicit Dynamic Frames: Combining Dynamic Frames and Separation Logicf writing frame annotations. From the precondition, one can then infer an upper bound on the set of locations writable or readable by the corresponding method. We implemented our approach in a tool, and used it to automatically verify several challenging programs, including subject-observer, iterator and linked list.
发表于 2025-3-30 23:09:56 | 显示全部楼层
Modular Visitor Components previous work exploring the connection between type-theoretic encodings of datatypes and visitors, we propose two solutions for this problem in Scala using .. These components can be grouped into . that can be easily composed in a . style to obtain customized datatypes and operations.
发表于 2025-3-31 01:31:38 | 显示全部楼层
Debugging Method Namesva defines an implicit convention for pairing names and implementations. We exploit this to extract rules for method names, which are used to identify “naming bugs” in well-known Java applications. We also present an approach for automatic suggestion of more suitable names in the presence of mismatch between name and implementation.
发表于 2025-3-31 06:30:05 | 显示全部楼层
发表于 2025-3-31 11:49:25 | 显示全部楼层
Leistungsbestimmende Faktoren im Fußball previous work exploring the connection between type-theoretic encodings of datatypes and visitors, we propose two solutions for this problem in Scala using .. These components can be grouped into . that can be easily composed in a . style to obtain customized datatypes and operations.
发表于 2025-3-31 14:57:20 | 显示全部楼层
,Fußball und Kommunikationstechnik,va defines an implicit convention for pairing names and implementations. We exploit this to extract rules for method names, which are used to identify “naming bugs” in well-known Java applications. We also present an approach for automatic suggestion of more suitable names in the presence of mismatch between name and implementation.
发表于 2025-3-31 20:49:08 | 显示全部楼层
,Ballenfuß, Hohlfuß, Hackenfuß,n adding type-level functions to Haskell, as I will briefly describe..I will explain what type classes are, how they differ from the classes of mainstream object oriented languages, why I think they are so cool, and what the hot topics are. I’ll give plenty of examples, so you don’t need to already know Haskell.
发表于 2025-3-31 21:50:37 | 显示全部楼层
,Andere krankhafte Zustände an der Ferse,lete, and a pragmatic variant that balances these tradeoffs. We prove soundness and completeness for the appropriate variants, and we show that the pragmatic variant can effectively check constraints from real-world programs.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-30 01:39
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表