Methods and tools for compiler construction
Methods and tools for compiler construction
On understanding types, data abstraction, and polymorphism
ACM Computing Surveys (CSUR) - The MIT Press scientific computation series
Global software: developing applications for the international market
Global software: developing applications for the international market
Compiler Construction: Principles and Practice
Compiler Construction: Principles and Practice
Formal Syntax and Semantics of Programming Languages: A Laboratory Based Approach
Formal Syntax and Semantics of Programming Languages: A Laboratory Based Approach
Programming Languages: Principles and Practice
Programming Languages: Principles and Practice
Software internationalisation and localisation: practice and evolution
PPPJ '02/IRE '02 Proceedings of the inaugural conference on the Principles and Practice of programming, 2002 and Proceedings of the second workshop on Intermediate representation engineering for virtual machines, 2002
Software Internationalization and Localization
OZCHI '96 Proceedings of the 6th Australian Conference on Computer-Human Interaction (OZCHI '96)
Key challenges in software internationalisation
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
Compilers: Principles, Techniques, and Tools (2nd Edition)
Compilers: Principles, Techniques, and Tools (2nd Edition)
Software internationalization and localization in web based ERP
Proceedings of the 26th annual ACM international conference on Design of communication
Hi-index | 0.00 |
One of the best methods for the internationalization and localization of an existing software system is to convert the program code to support Unicode, this method supports the internationalization very well. In this paper, a technique based on lexical analysis is proposed to migrate the program automatically to Unicode. This technique scans the program code twice: detecting, analyzing and manually converting the suspicious code in the first scanning, and auto-converting the remaining code in the second scanning. Applied to a system which has 10 million lines of C/C++ code, the technique was proved to be available and highly efficient. This technique is universal and can be widely used.