Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,422,769 papers from all fields of science
Search
Sign In
Create Free Account
Method (computer programming)
Known as:
Static methods
, Method (oo)
, Method (computer science)
Expand
A method in object-oriented programming (OOP) is a procedure associated with a message and an object. An object is made up of data and behavior…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ABC score
Algebraic specification
Boilerplate code
COBOL
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Paleoslope Reconstruction In Sandy Suspended-Load-Dominant Rivers
R. Lynds
,
D. Mohrig
,
E. Hajek
,
P. Heller
2014
Corpus ID: 59432375
Constraining the depositional gradient of ancient alluvial river systems can aid in reconstructing landscapes and estimating…
Expand
Review
2011
Review
2011
Digital architectures realizing piecewise‐linear multivariate functions: Two FPGA implementations
M. Storace
,
Tomaso Poggi
International journal of circuit theory and…
2011
Corpus ID: 3797471
Digital architectures for the circuit realization of multivariate piecewise‐linear (PWL) functions are reviewed and compared. The…
Expand
2006
2006
Model Checking of Software Components: Combining Java PathFinder and Behavior Protocol Model Checker
P. Parízek
,
F. Plášil
,
J. Kofroň
30th Annual IEEE/NASA Software Engineering…
2006
Corpus ID: 13971815
Although there exist several software model checkers that check the code against properties specified e.g. via a temporal logic…
Expand
2004
2004
A distributed formation of a virtual backbone in MANETs using adjustable transmission ranges
Jie Wu
,
Fei Dai
24th International Conference on Distributed…
2004
Corpus ID: 2602836
Recently, the use of a virtual backbone (connected dominating set) in various applications in mobile ad hoc networks (MANETs) has…
Expand
2002
2002
DETERMINATION OF THE FUEL-OPTIMAL TRAJECTORY FOR A VEHICLE ALONG A KNOWN ROUTE
F. Kirschbaum
,
Michael Back
,
Martin Hart
2002
Corpus ID: 7970486
Abstract Integration of topology data of the entire road ahead into the powertrain control unit in combination with hybrid…
Expand
2001
2001
A case study in detecting software security vulnerabilities using constraint optimization
M. Weber
,
V. Shah
,
C. Ren
Proceedings First IEEE International Workshop on…
2001
Corpus ID: 910592
In this paper we present a case study in static analysis, with a focus on static methods for detecting buffer overflow…
Expand
Highly Cited
1998
Highly Cited
1998
Pattern-based design recovery of Java software
Jochen Seemann
,
J. V. Gudenberg
SIGSOFT '98/FSE-6
1998
Corpus ID: 17955964
In this paper we show how to recover design information from Java source code. We take a pattern-based approach and proceed in a…
Expand
Highly Cited
1993
Highly Cited
1993
An improved method for RTL synthesis with testability tradeoffs
H. Harmanani
,
C. Papachristou
International Conference on Computer Aided Design
1993
Corpus ID: 7866023
A method for high level synthesis with testability is presented with the objective to generate self-testable RTL datapath…
Expand
1993
1993
Adaptive Control of Robot Manipulators in Constrained Motion
B. Yao
,
M. Tomizuka
American Control Conference
1993
Corpus ID: 42135442
Adaptive motion and force control of manipulators in constrained motion in the presence of parametric uncertainties both in the…
Expand
1989
1989
Metaclass compatibility
N. Graube
Conference on Object-Oriented Programming Systems…
1989
Corpus ID: 11446240
Metaclasses provide control of object description, method compilation and more generally class behaviour. Consequently, they have…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE