Abstract is missing.
- WebGraph: things you thought you could not do with Java™Paolo Boldi, Sebastiano Vigna. 1-8 [doi]
- An empirical investigation into the dimensions of run-time coupling in Java programsÁine Mitchell, James F. Power. 9-14 [doi]
- A quantitative analysis of Java bytecode sequencesBen Stephenson, Wade Holst. 15-20 [doi]
- On structurally testing Java programs effectivelyNicos Malevris. 21-26 [doi]
- Visualization and analysis of phased behavior in Java programsPriya Nagpurkar, Chandra Krintz. 27-33 [doi]
- A tool for incorporating unit testing into a Java programming curriculumColin Depradine, Julian Arthur. 34-39 [doi]
- Using the divide and conquer strategy to teach Java framework designH. Conrad Cunningham, Yi Liu, Cuihua Zhang. 40-45 [doi]
- A full Java post-graduate curriculumJ.-P. Jacquot. 46-51 [doi]
- An example oriented on-line Java tutorial for university studentsJianna J. Zhang, Huy Nguyen. 52-60 [doi]
- Safe instantiation in generic JavaEric E. Allen, Robert Cartwright. 61-66 [doi]
- New and improved: Linda in JavaGeorge Wells. 67-74 [doi]
- A low-footprint class loading mechanism for embedded Java virtual machinesChristophe Rippert, Alexandre Courbot, Gilles Grimaud. 75-82 [doi]
- Profile-driven code unloading for resource-constrained JVMsLingli Zhang, Chandra Krintz. 83-90 [doi]
- A heap de/compression module for wireless JavaMayumi Kato, Chia-Tien Dan Lo. 91-99 [doi]
- A dynamic compiler for embedded Java virtual machinesMourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Nadia Tawbi, Hamdi Yahyaoui, Sami Zhioua. 100-106 [doi]
- a synergy between efficient interpretation and fast selective dynamic compilation for the acceleration of embedded Java virtual machinesMourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Hamdi Yahyaoui, Sami Zhioua. 107-113 [doi]
- Voice activated command and control with Java-enabled speech recognition over WifiTony Ayres, Brian Nolan. 114-119 [doi]
- Java event broadcasting in CSCW environmentChien-Min Wang, Shun-Te Wang, Shyh-Fong Hong, Hsi-Min Chen. 120-125 [doi]
- Implementing a NTP-based time service within a distributed middleware systemHasan Bulut, Shrideep Pallickara, Geoffrey Fox. 126-134 [doi]
- Embedding JAAS in agent roles to apply local security policiesGiacomo Cabri, Luca Ferrari, Letizia Leonardi. 135-140 [doi]
- MailConfigurator: automatic configuration of e-mail accounts through Java mobile agentsGiacomo Cabri, Luca Ferrari, Letizia Leonardi. 141-142 [doi]
- Improving approximate matching capabilities for Meta Map Transfer applicationsSimon Y. Berkovich, Mohammad Inayatullah. 143-147 [doi]
- Implementation of a model-centric web application framework with J2EERalf Gitzel, Markus Aleksy. 148-153 [doi]
- An Identity Based Encryption systemLouise Owens, Adam Duffy, Tom Dowling. 154-159 [doi]