Thomas Holl

Learn More
We detect design patterns in legacy code combining static and dynamic analyses. The analyses do not depend on coding or naming conventions. We classify potential pattern instances according to the evidence our analyses provide. We discuss our approach for the Observer, Composite, Mediator, Chain of Responsibility and Visitor Patterns. Our Java analysis tool(More)
We detect interaction patterns in legacy code combining static and dynamic analyses. The analyses do not depend on coding or naming conventions. We classified potential pattern instances according to the evidence our analyses provide. We discuss our approach with the Observer Pattern as an example. Our Java implementation analyzes Java programs. We(More)
This paper proposes and evaluates a simple energy-aware image transmission protocol suitable for wireless sensor networks. Energy savings is achieved through the use of a wavelet image transform and a semi-reliable transmission. On the one hand, wavelet image transform provides data decomposition in multiple levels of resolution , so the image can be(More)
Lossy compressed data, and multimedia content by extension can afford some further losses or degradation in lossy networks without removing its meaning. Still images coded by JPEG2000 exhibit a codestream hierarchically built with codeblock contributions organized in packets across quality layers and resolutions. In this paper we show how the image suffers(More)
  • 1