Learn More
We detect design patterns in legacy code combining static and dynamic analyses. The analyses do not depend on coding or naming conventions. We classify potential pattern instances according to the evidence our analyses provide. We discuss our approach for the Observer, Composite, Mediator, Chain of Responsibility and Visitor Patterns. Our Java analysis tool(More)
We detect interaction patterns in legacy code combining static and dynamic analyses. The analyses do not depend on coding or naming conventions. We classified potential pattern instances according to the evidence our analyses provide. We discuss our approach with the Observer Pattern as an example. Our Java implementation analyzes Java programs. We(More)
When expressed in NOD, but not C57BL/6 (B6) genetic background mice, the common class I variants encoded by the H2g7 MHC haplotype aberrantly lose the ability to mediate the thymic deletion of autoreactive CD8+ T cells contributing to type 1 diabetes (T1D). This indicated some subset of the T1D susceptibility (Idd) genes located outside the MHC of NOD mice(More)
This paper proposes and evaluates a simple energy-aware image transmission protocol suitable for wireless sensor networks. Energy savings is achieved through the use of a wavelet image transform and a semi-reliable transmission. On the one hand, wavelet image transform provides data decomposition in multiple levels of resolution , so the image can be(More)
Lossy compressed data, and multimedia content by extension can afford some further losses or degradation in lossy networks without removing its meaning. Still images coded by JPEG2000 exhibit a codestream hierarchically built with codeblock contributions organized in packets across quality layers and resolutions. In this paper we show how the image suffers(More)
  • 1