Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,990,542 papers from all fields of science
Search
Sign In
Create Free Account
Method (computer programming)
Known as:
Static methods
, Method (oo)
, Method (computer science)
Expand
A method in object-oriented programming (OOP) is a procedure associated with a message and an object. An object is made up of data and behavior…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ABC score
Algebraic specification
Boilerplate code
COBOL
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2008
2008
Optimised rough sets for modelling interstate conflict
Bodie Crossingham
,
T. Marwala
,
M. Lagazio
IEEE International Conference on Systems, Man and…
2008
Corpus ID: 37655628
Rough set theory is technique that deals with the formal approximation of crisp sets thereby modeling vagueness and uncertainty…
Expand
2007
2007
Using ontology search in the design of class diagram from business process model
Wararat Rungworawut
,
T. Senivongse
2007
Corpus ID: 18513087
Business process model describes process flow of a business and can be seen as the requirement for developing a software…
Expand
2005
2005
Extending dynamic aspect mining with static information
S. Breu
IEEE Working Conference on Source Code Analysis…
2005
Corpus ID: 21095735
Aspect mining tries to identify crosscutting concerns in legacy systems and thus supports the refactoring into an aspect-oriented…
Expand
2004
2004
Combining classifiers for harmful document filtering
B. Grilhères
,
S. Brunessaux
,
Philippe Leray
RIAO Conference
2004
Corpus ID: 16741927
In this paper, we describe the experiments that we have carried out during the European Research Project NetProtect II that aims…
Expand
Review
2003
Review
2003
Personal Authentication Using Signature Recognition
Diana Kalenova
2003
Corpus ID: 17948521
In this paper, a problem of personal authentication through the use of signature recognition is described. The methods of…
Expand
2002
2002
Metrological analysis of the LIDFT method
J. Borkowski
,
J. Mroczka
IEEE Transactions on Instrumentation and…
2002
Corpus ID: 37744545
The estimation error components in the DFT linear interpolation (LIDFT) method have been presented in the paper. The equations…
Expand
2001
2001
A case study in detecting software security vulnerabilities using constraint optimization
M. Weber
,
V. Shah
,
C. Ren
Proceedings First IEEE International Workshop on…
2001
Corpus ID: 910592
In this paper we present a case study in static analysis, with a focus on static methods for detecting buffer overflow…
Expand
2000
2000
Treatment of horizontal and vertical tidal signals in GPS data: A case study on a floating ice shelf
Matt A. King
,
R. Coleman
,
P. Morgan
2000
Corpus ID: 55633476
Knowledge of the surface velocity and strain of ice shelves is important in determining their present kinematic state and…
Expand
1989
1989
Metaclass compatibility
N. Graube
Conference on Object-Oriented Programming Systems…
1989
Corpus ID: 11446240
Metaclasses provide control of object description, method compilation and more generally class behaviour. Consequently, they have…
Expand
1982
1982
Dynamic systems and their distributed termination
Shimon Cohen
,
D. Lehmann
ACM SIGACT-SIGOPS Symposium on Principles of…
1982
Corpus ID: 33220468
This paper describes a new model for dynamic distributed systems, where new processes are added and terminated at execution time…
Expand