Thomas Holl

Learn More
We detect design patterns in legacy code combining static and dynamic analyses. The analyses do not depend on coding or naming conventions. We classify potential pattern instances according to the evidence our analyses provide. We discuss our approach for the Observer, Composite, Mediator, Chain of Responsibility and Visitor Patterns. Our Java analysis tool(More)
Lossy compressed data, and multimedia content by extension can afford some further losses or degradation in lossy networks without removing its meaning. Still images coded by JPEG2000 exhibit a codestream hierarchically built with codeblock contributions organized in packets across quality layers and resolutions. In this paper we show how the image suffers(More)
  • 1