Zeitschriftenartikel zum Thema „Java bytecode“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Java bytecode" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Gal, Andreas, Christian W. Probst, and Michael Franz. "Integrated Java Bytecode Verification." Electronic Notes in Theoretical Computer Science 131 (May 2005): 27–38. http://dx.doi.org/10.1016/j.entcs.2005.01.020.
Der volle Inhalt der QuelleKim, Ki-Tae, Je-Min Kim, and Weon-Hee Yoo. "Implementation of Java Bytecode Framework." Journal of the Korea Contents Association 10, no. 3 (2010): 122–31. http://dx.doi.org/10.5392/jkca.2010.10.3.122.
Der volle Inhalt der QuelleReynolds, Mark C. "Modeling the Java Bytecode Verifier." Science of Computer Programming 78, no. 3 (2013): 327–42. http://dx.doi.org/10.1016/j.scico.2011.03.008.
Der volle Inhalt der QuelleBertelsen, Peter. "Dynamic semantics of Java bytecode." Future Generation Computer Systems 16, no. 7 (2000): 841–50. http://dx.doi.org/10.1016/s0167-739x(99)00094-1.
Der volle Inhalt der QuelleCook, J. J. "Reverse Execution of Java Bytecode." Computer Journal 45, no. 6 (2002): 608–19. http://dx.doi.org/10.1093/comjnl/45.6.608.
Der volle Inhalt der QuelleZhao, Jian-jun. "Static analysis of Java bytecode." Wuhan University Journal of Natural Sciences 6, no. 1-2 (2001): 383–90. http://dx.doi.org/10.1007/bf03160273.
Der volle Inhalt der QuelleIqbal, Adeel, and Minhaj Ahmad Khan. "Optimizing Storage Space on Embedded Systems Using Superinstructions." STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH 6, no. 2 (2024): 219–36. https://doi.org/10.52700/scir.v6i2.164.
Der volle Inhalt der QuelleDobravec, Tomaž. "JAVA BYTECODE INSTRUCTION USAGE COUNTING WITH ALGATOR." Acta Electrotechnica et Informatica 18, no. 4 (2018): 17–25. http://dx.doi.org/10.15546/aeei-2018-0028.
Der volle Inhalt der QuelleWang, Tao, and Abhik Roychoudhury. "Dynamic slicing on Java bytecode traces." ACM Transactions on Programming Languages and Systems 30, no. 2 (2008): 1–49. http://dx.doi.org/10.1145/1330017.1330021.
Der volle Inhalt der QuelleChan, Jien-Tsai, and Wuu Yang. "Advanced obfuscation techniques for Java bytecode." Journal of Systems and Software 71, no. 1-2 (2004): 1–10. http://dx.doi.org/10.1016/s0164-1212(02)00066-3.
Der volle Inhalt der QuelleGhosh, Sudipto, and John L. Kelly. "Bytecode fault injection for Java software." Journal of Systems and Software 81, no. 11 (2008): 2034–43. http://dx.doi.org/10.1016/j.jss.2008.02.047.
Der volle Inhalt der QuelleChrząszcz, Jacek, Patryk Czarnik, and Aleksy Schubert. "A Dozen Instructions Make Java Bytecode." Electronic Notes in Theoretical Computer Science 264, no. 4 (2011): 19–34. http://dx.doi.org/10.1016/j.entcs.2011.02.003.
Der volle Inhalt der QuelleLeroy, Xavier. "Bytecode verification on Java smart cards." Software: Practice and Experience 32, no. 4 (2002): 319–40. http://dx.doi.org/10.1002/spe.438.
Der volle Inhalt der QuelleEichberg, Michael. "BAT2XML: XML-based Java Bytecode Representation." Electronic Notes in Theoretical Computer Science 141, no. 1 (2005): 93–107. http://dx.doi.org/10.1016/j.entcs.2005.02.035.
Der volle Inhalt der QuelleLi, Zhiming, Qing Wu, and Kun Qian. "Adabot: Fault-Tolerant Java Decompiler (Student Abstract)." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 10 (2020): 13861–62. http://dx.doi.org/10.1609/aaai.v34i10.7203.
Der volle Inhalt der QuelleJiang, Long Long, and Dai Ping Li. "Using Contour Marking Bytecode Verification Algorithm on the Java Card." Applied Mechanics and Materials 556-562 (May 2014): 4120–23. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.4120.
Der volle Inhalt der QuelleOgata, Kazunori, Hideaki Komatsu, and Toshio Nakatani. "Bytecode fetch optimization for a Java interpreter." ACM SIGARCH Computer Architecture News 30, no. 5 (2002): 58–67. http://dx.doi.org/10.1145/635506.605404.
Der volle Inhalt der QuelleOgata, Kazunori, Hideaki Komatsu, and Toshio Nakatani. "Bytecode fetch optimization for a Java interpreter." ACM SIGOPS Operating Systems Review 36, no. 5 (2002): 58–67. http://dx.doi.org/10.1145/635508.605404.
Der volle Inhalt der QuelleMunsil, Wes, and Chia-Jiu Wang. "Reducing stack usage in Java bytecode execution." ACM SIGARCH Computer Architecture News 26, no. 1 (1998): 7–11. http://dx.doi.org/10.1145/1216461.1216464.
Der volle Inhalt der QuelleQian, Zhenyu. "Standard fixpoint iteration for Java bytecode verification." ACM Transactions on Programming Languages and Systems 22, no. 4 (2000): 638–72. http://dx.doi.org/10.1145/363911.363915.
Der volle Inhalt der QuelleDoyon, S., and M. Debbabi. "On object initialization in the Java bytecode." Computer Communications 23, no. 17 (2000): 1594–605. http://dx.doi.org/10.1016/s0140-3664(00)00245-0.
Der volle Inhalt der QuelleOgata, Kazunori, Hideaki Komatsu, and Toshio Nakatani. "Bytecode fetch optimization for a Java interpreter." ACM SIGPLAN Notices 37, no. 10 (2002): 58–67. http://dx.doi.org/10.1145/605432.605404.
Der volle Inhalt der QuelleAvvenuti, Marco, Cinzia Bernardeschi, and Nicoletta De Francesco. "Java bytecode verification for secure information flow." ACM SIGPLAN Notices 38, no. 12 (2003): 20–27. http://dx.doi.org/10.1145/966051.966055.
Der volle Inhalt der QuelleStata, Raymie, and Martin Abadi. "A type system for Java bytecode subroutines." ACM Transactions on Programming Languages and Systems 21, no. 1 (1999): 90–137. http://dx.doi.org/10.1145/314602.314606.
Der volle Inhalt der QuelleVincenzi, A. M. R., M. E. Delamaro, J. C. Maldonado, and W. E. Wong. "Establishing structural testing criteria for Java bytecode." Software: Practice and Experience 36, no. 14 (2006): 1513–41. http://dx.doi.org/10.1002/spe.726.
Der volle Inhalt der QuelleCollberg, Christian, Ginger Myles, and Michael Stepp. "An empirical study of Java bytecode programs." Software: Practice and Experience 37, no. 6 (2007): 581–641. http://dx.doi.org/10.1002/spe.776.
Der volle Inhalt der QuelleMeehan, Gary, and Mike Joy. "Compiling lazy functional programs to Java bytecode." Software: Practice and Experience 29, no. 7 (1999): 617–45. http://dx.doi.org/10.1002/(sici)1097-024x(199906)29:7<617::aid-spe250>3.0.co;2-e.
Der volle Inhalt der QuelleAlbert, E., P. Arenas, S. Genaim, G. Puebla, and D. Zanardini. "Experiments in Cost Analysis of Java Bytecode." Electronic Notes in Theoretical Computer Science 190, no. 1 (2007): 67–83. http://dx.doi.org/10.1016/j.entcs.2007.02.061.
Der volle Inhalt der QuelleBernardeschi, C., N. De Francesco, G. Lettieri, and L. Martini. "Checking secure information flow in Java bytecode by code transformation and standard bytecode verification." Software: Practice and Experience 34, no. 13 (2004): 1225–55. http://dx.doi.org/10.1002/spe.611.
Der volle Inhalt der QuelleSherman, Elena, Yannic Noller, Cyrille Artho, et al. "The Java Pathfinder Workshop 2022." ACM SIGSOFT Software Engineering Notes 48, no. 1 (2023): 19–21. http://dx.doi.org/10.1145/3573074.3573080.
Der volle Inhalt der QuelleHaase, Oliver. "Abstract Interpretation of Java Bytecode for Immutability Analysis." Journal of Computer Science 12, no. 7 (2016): 314–22. http://dx.doi.org/10.3844/jcssp.2016.314.322.
Der volle Inhalt der QuelleClausen, Lars Ræder, Ulrik Pagh Schultz, Charles Consel, and Gilles Muller. "Java bytecode compression for low-end embedded systems." ACM Transactions on Programming Languages and Systems 22, no. 3 (2000): 471–89. http://dx.doi.org/10.1145/353926.353933.
Der volle Inhalt der QuelleJipping, Michael J., Cameron Calka, Brian O'Neill, and Christopher R. Padilla. "Teaching students java bytecode using lego mindstorms robots." ACM SIGCSE Bulletin 39, no. 1 (2007): 170–74. http://dx.doi.org/10.1145/1227504.1227371.
Der volle Inhalt der QuelleGal, Andreas, Christian W. Probst, and Michael Franz. "Java bytecode verification via static single assignment form." ACM Transactions on Programming Languages and Systems 30, no. 4 (2008): 1–21. http://dx.doi.org/10.1145/1377492.1377496.
Der volle Inhalt der QuelleBARTHE, GILLES, DAVID PICHARDIE, and TAMARA REZK. "A certified lightweight non-interference Java bytecode verifier." Mathematical Structures in Computer Science 23, no. 5 (2013): 1032–81. http://dx.doi.org/10.1017/s0960129512000850.
Der volle Inhalt der QuellePayet, Étienne, and Fausto Spoto. "Experiments with Non-Termination Analysis for Java Bytecode." Electronic Notes in Theoretical Computer Science 253, no. 5 (2009): 83–96. http://dx.doi.org/10.1016/j.entcs.2009.11.016.
Der volle Inhalt der QuelleSpoto, Fausto, and Étienne Payet. "Magic-sets for localised analysis of Java bytecode." Higher-Order and Symbolic Computation 23, no. 1 (2010): 29–86. http://dx.doi.org/10.1007/s10990-010-9063-7.
Der volle Inhalt der QuelleMcGhan, H., and M. O'Connor. "PicoJava: a direct execution engine for Java bytecode." Computer 31, no. 10 (1998): 22–30. http://dx.doi.org/10.1109/2.722273.
Der volle Inhalt der QuelleKnoblock, Todd B., and Jakob Rehof. "Type elaboration and subtype completion for Java bytecode." ACM Transactions on Programming Languages and Systems 23, no. 2 (2001): 243–72. http://dx.doi.org/10.1145/383043.383045.
Der volle Inhalt der QuelleCoglio, Alessandro. "Improving the official specification of Java bytecode verification." Concurrency and Computation: Practice and Experience 15, no. 2 (2003): 155–79. http://dx.doi.org/10.1002/cpe.714.
Der volle Inhalt der QuelleCoglio, Alessandro. "Simple verification technique for complex Java bytecode subroutines." Concurrency and Computation: Practice and Experience 16, no. 7 (2004): 647–70. http://dx.doi.org/10.1002/cpe.798.
Der volle Inhalt der QuelleClausen, Lars R. "A Java bytecode optimizer using side-effect analysis." Concurrency: Practice and Experience 9, no. 11 (1997): 1031–45. http://dx.doi.org/10.1002/(sici)1096-9128(199711)9:11<1031::aid-cpe354>3.0.co;2-o.
Der volle Inhalt der QuelleBernardeschi, Cinzia, Giuseppe Lettieri, Luca Martini, and Paolo Masci. "A Space-Aware Bytecode Verifier for Java Cards." Electronic Notes in Theoretical Computer Science 141, no. 1 (2005): 237–54. http://dx.doi.org/10.1016/j.entcs.2005.02.027.
Der volle Inhalt der QuelleBinder, Walter, and Jarle Hulaas. "Java Bytecode Transformations for Efficient, Portable CPU Accounting." Electronic Notes in Theoretical Computer Science 141, no. 1 (2005): 53–73. http://dx.doi.org/10.1016/j.entcs.2005.02.037.
Der volle Inhalt der QuelleLambert, Jonathan, Rosemary Monahan, and Kevin Casey. "Accidental Choices—How JVM Choice and Associated Build Tools Affect Interpreter Performance." Computers 11, no. 6 (2022): 96. http://dx.doi.org/10.3390/computers11060096.
Der volle Inhalt der QuelleGAMESS, ERIC. "EXECUTION OF SEQUENTIAL AND PARALLEL JAVA BYTECODE IN A METACOMPUTING SYSTEM." Parallel Processing Letters 13, no. 01 (2003): 53–64. http://dx.doi.org/10.1142/s0129626403001148.
Der volle Inhalt der QuelleVartanov, S. P., and M. K. Ermakov. "Applying Java bytecode static instrumentation for software dynamic analysis." Proceedings of the Institute for System Programming of the RAS 27, no. 1 (2015): 25–38. http://dx.doi.org/10.15514/ispras-2015-27(1)-2.
Der volle Inhalt der QuellePapadimitriou, Stergios, Seferina Mavroudi, Kostas Theofilatos, and Spiridon Likothanasis. "MATLAB-Like Scripting of Java Scientific Libraries in ScalaLab." Scientific Programming 22, no. 3 (2014): 187–99. http://dx.doi.org/10.1155/2014/570902.
Der volle Inhalt der QuelleBockisch, Christoph, Gabriele Taentzer, Nebras Nassar, and Lukas Wydra. "Java Bytecode Verification with OCL Why, How and Whenc." Journal of Object Technology 19, no. 3 (2020): 3:1. http://dx.doi.org/10.5381/jot.2020.19.3.a13.
Der volle Inhalt der QuelleAchour, Safaa, Ali Chouenyib, and Mohammed Benattou. "A Constraint-Based Verification Approach for Java Bytecode Programs." International Journal of Software Engineering and Its Applications 12, no. 2 (2018): 1–17. http://dx.doi.org/10.14257/ijseia.2018.12.2.01.
Der volle Inhalt der Quelle