Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,612,165 papers from all fields of science
Search
Sign In
Create Free Account
Method (computer programming)
Known as:
Static methods
, Method (oo)
, Method (computer science)
Expand
A method in object-oriented programming (OOP) is a procedure associated with a message and an object. An object is made up of data and behavior…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ABC score
Algebraic specification
Boilerplate code
COBOL
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2007
2007
Using ontology search in the design of class diagram from business process model
Wararat Rungworawut
,
T. Senivongse
2007
Corpus ID: 18513087
Business process model describes process flow of a business and can be seen as the requirement for developing a software…
Expand
2005
2005
Extending dynamic aspect mining with static information
S. Breu
IEEE Working Conference on Source Code Analysis…
2005
Corpus ID: 21095735
Aspect mining tries to identify crosscutting concerns in legacy systems and thus supports the refactoring into an aspect-oriented…
Expand
2004
2004
Combining classifiers for harmful document filtering
B. Grilhères
,
S. Brunessaux
,
Philippe Leray
RIAO Conference
2004
Corpus ID: 16741927
In this paper, we describe the experiments that we have carried out during the European Research Project NetProtect II that aims…
Expand
Review
2003
Review
2003
Personal Authentication Using Signature Recognition
Diana Kalenova
2003
Corpus ID: 17948521
In this paper, a problem of personal authentication through the use of signature recognition is described. The methods of…
Expand
2002
2002
Metrological analysis of the LIDFT method
J. Borkowski
,
J. Mroczka
IEEE Transactions on Instrumentation and…
2002
Corpus ID: 37744545
The estimation error components in the DFT linear interpolation (LIDFT) method have been presented in the paper. The equations…
Expand
2001
2001
A case study in detecting software security vulnerabilities using constraint optimization
M. Weber
,
V. Shah
,
C. Ren
Proceedings First IEEE International Workshop on…
2001
Corpus ID: 910592
In this paper we present a case study in static analysis, with a focus on static methods for detecting buffer overflow…
Expand
2000
2000
Treatment of horizontal and vertical tidal signals in GPS data: A case study on a floating ice shelf
Matt A. King
,
R. Coleman
,
P. Morgan
2000
Corpus ID: 55633476
Knowledge of the surface velocity and strain of ice shelves is important in determining their present kinematic state and…
Expand
1999
1999
Homeostatic regulation upon changes of enzyme activities in the Calvin cycle as an example for general mechanisms of flux control. What can we expect from transgenic plants?
L. Fridlyand
,
J. Backhausen
,
R. Scheibe
Photosynthesis Research
1999
Corpus ID: 21472871
In order to explain the mechanisms of Calvin-cycle regulation, the general properties of metabolic systems under homeostatic flux…
Expand
Highly Cited
1998
Highly Cited
1998
Pattern-based design recovery of Java software
Jochen Seemann
,
J. V. Gudenberg
SIGSOFT '98/FSE-6
1998
Corpus ID: 17955964
In this paper we show how to recover design information from Java source code. We take a pattern-based approach and proceed in a…
Expand
1989
1989
Metaclass compatibility
N. Graube
Conference on Object-Oriented Programming Systems…
1989
Corpus ID: 11446240
Metaclasses provide control of object description, method compilation and more generally class behaviour. Consequently, they have…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE