Academic literature on the topic 'Java bytecode'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Java bytecode.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Java bytecode"
Gal, Andreas, Christian W. Probst, and Michael Franz. "Integrated Java Bytecode Verification." Electronic Notes in Theoretical Computer Science 131 (May 2005): 27–38. http://dx.doi.org/10.1016/j.entcs.2005.01.020.
Full textKim, Ki-Tae, Je-Min Kim, and Weon-Hee Yoo. "Implementation of Java Bytecode Framework." Journal of the Korea Contents Association 10, no. 3 (2010): 122–31. http://dx.doi.org/10.5392/jkca.2010.10.3.122.
Full textReynolds, Mark C. "Modeling the Java Bytecode Verifier." Science of Computer Programming 78, no. 3 (2013): 327–42. http://dx.doi.org/10.1016/j.scico.2011.03.008.
Full textBertelsen, Peter. "Dynamic semantics of Java bytecode." Future Generation Computer Systems 16, no. 7 (2000): 841–50. http://dx.doi.org/10.1016/s0167-739x(99)00094-1.
Full textCook, J. J. "Reverse Execution of Java Bytecode." Computer Journal 45, no. 6 (2002): 608–19. http://dx.doi.org/10.1093/comjnl/45.6.608.
Full textZhao, Jian-jun. "Static analysis of Java bytecode." Wuhan University Journal of Natural Sciences 6, no. 1-2 (2001): 383–90. http://dx.doi.org/10.1007/bf03160273.
Full textIqbal, Adeel, and Minhaj Ahmad Khan. "Optimizing Storage Space on Embedded Systems Using Superinstructions." STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH 6, no. 2 (2024): 219–36. https://doi.org/10.52700/scir.v6i2.164.
Full textDobravec, Tomaž. "JAVA BYTECODE INSTRUCTION USAGE COUNTING WITH ALGATOR." Acta Electrotechnica et Informatica 18, no. 4 (2018): 17–25. http://dx.doi.org/10.15546/aeei-2018-0028.
Full textWang, Tao, and Abhik Roychoudhury. "Dynamic slicing on Java bytecode traces." ACM Transactions on Programming Languages and Systems 30, no. 2 (2008): 1–49. http://dx.doi.org/10.1145/1330017.1330021.
Full textChan, Jien-Tsai, and Wuu Yang. "Advanced obfuscation techniques for Java bytecode." Journal of Systems and Software 71, no. 1-2 (2004): 1–10. http://dx.doi.org/10.1016/s0164-1212(02)00066-3.
Full textDissertations / Theses on the topic "Java bytecode"
Batchelder, Michael Robert. "Java bytecode obfuscation." Thesis, McGill University, 2007. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=18300.
Full textKlein, Gerwin. "Verified Java bytecode verification." [S.l. : s.n.], 2003. http://deposit.ddb.de/cgi-bin/dokserv?idn=967128749.
Full textShah, Rahul Arvind. "Vulnerability assessment of Java bytecode." Auburn, Ala., 2005. http://repo.lib.auburn.edu/Send%2012-16-07/SHAH_RAHUL_44.pdf.
Full textOchani, Vidit. "Java bytecode to Pilar translator." Kansas State University, 2013. http://hdl.handle.net/2097/16987.
Full textDoyon, Stéphane. "On the security of Java, the Java bytecode verifier." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0004/MQ41890.pdf.
Full textVallee-Rai, Raja. "Soot : a java bytecode optimization framework." Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=30836.
Full textPinto, Camara Tarcisio. "Otimização bytecode Java na plataforma J2ME." Universidade Federal de Pernambuco, 2004. https://repositorio.ufpe.br/handle/123456789/2567.
Full textModesto, Francisco. "Development of a Java Bytecode Front-End." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-6210.
Full textZabel, Martin. "Effiziente Mehrkernarchitektur für eingebettete Java-Bytecode-Prozessoren." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2012. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-84156.
Full textZabel, Martin, and Rainer G. Spallek. "SHAP — Scalable Multi-Core Java Bytecode Processor." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2012. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-97619.
Full textBooks on the topic "Java bytecode"
Lew, Dion. BCIR: A framework for the representation and manipulation of the Java bytecode. 2001.
Find full textBook chapters on the topic "Java bytecode"
Stärk, Robert F., Joachim Schmid, and Egon Börger. "Bytecode type assignments." In Java and the Java Virtual Machine. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/978-3-642-59495-3_16.
Full textCzarnik, Patryk, Jacek Chrząszcz, and Aleksy Schubert. "A Java Bytecode Formalisation." In Lecture Notes in Computer Science. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03592-1_8.
Full textFischer, Robert. "Lambdas in Java Bytecode." In Java Closures and Lambda. Apress, 2015. http://dx.doi.org/10.1007/978-1-4302-5999-2_8.
Full textAlbert, Elvira, Puri Arenas, Michael Codish, Samir Genaim, Germán Puebla, and Damiano Zanardini. "Termination Analysis of Java Bytecode." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-68863-1_2.
Full textBrockschmidt, Marc, Carsten Otto, Christian von Essen, and Jürgen Giesl. "Termination Graphs for Java Bytecode." In Verification, Induction, Termination Analysis. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17172-7_2.
Full textLaneve, Cosimo, and Abel Garcia. "Deadlock Detection of Java Bytecode." In Logic-Based Program Synthesis and Transformation. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94460-9_3.
Full textLeroy, Xavier. "Java Bytecode Verification: An Overview." In Computer Aided Verification. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44585-4_26.
Full textAlbert, E., P. Arenas, S. Genaim, G. Puebla, and D. Zanardini. "Cost Analysis of Java Bytecode." In Programming Languages and Systems. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-71316-6_12.
Full textTanter, Éric, Marc Ségura-Devillechaise, Jacques Noyé, and José Piquer. "Altering Java Semantics via Bytecode Manipulation." In Generative Programming and Component Engineering. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45821-2_18.
Full textGenaim, Samir, and Fausto Spoto. "Information Flow Analysis for Java Bytecode." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-30579-8_23.
Full textConference papers on the topic "Java bytecode"
Barbuti, Roberto, and Stefano Cataudella. "Java bytecode verification on Java cards." In the 2004 ACM symposium. ACM Press, 2004. http://dx.doi.org/10.1145/967900.967991.
Full textBinder, Walter, Jarle Hulaas, and Philippe Moret. "Advanced Java bytecode instrumentation." In the 5th international symposium. ACM Press, 2007. http://dx.doi.org/10.1145/1294325.1294344.
Full textVincenzi, A. M. R., M. E. Delamaro, A. S. Simão, W. E. Wong, and J. C. Maldonado. "JaBÁ: A Java Bytecoder Analyser." In Simpósio Brasileiro de Engenharia de Software. Sociedade Brasileira de Computação, 2002. http://dx.doi.org/10.5753/sbes.2002.23968.
Full textBurdy, Lilian, and Mariela Pavlova. "Java bytecode specification and verification." In the 2006 ACM symposium. ACM Press, 2006. http://dx.doi.org/10.1145/1141277.1141708.
Full textLance, Don, Roland H. Untch, and Nancy J. Wahl. "Bytecode-based Java program analysis." In the 37th annual Southeast regional conference (CD-ROM). ACM Press, 1999. http://dx.doi.org/10.1145/306363.306382.
Full textRibeiro, José Carlos Bregieiro, Francisco Fernández de Vega, and Mário Zenha-Rela. "Using Dynamic Analysis Of Java Bytecode For Evolutionary Object-Oriented Unit Testing." In Workshop de Testes e Tolerância a Falhas. Sociedade Brasileira de Computação - SBC, 2007. http://dx.doi.org/10.5753/wtf.2007.23245.
Full text"JSIMIL - A Java Bytecode Clone Detector." In 5th International Conference on Software and Data Technologies. SciTePress - Science and and Technology Publications, 2010. http://dx.doi.org/10.5220/0003013403330336.
Full textZambon, Andrea. "Aucsmith-Like Obfuscation of Java Bytecode." In 2012 12th IEEE Working Conference on Source Code Analysis and Manipulation (SCAM). IEEE, 2012. http://dx.doi.org/10.1109/scam.2012.14.
Full textOcteau, Damien, Somesh Jha, and Patrick McDaniel. "Retargeting Android applications to Java bytecode." In the ACM SIGSOFT 20th International Symposium. ACM Press, 2012. http://dx.doi.org/10.1145/2393596.2393600.
Full textSantone, Antonella, and Gigliola Vaglini. "Local model checking of Java bytecode." In the 14th international conference. ACM Press, 2002. http://dx.doi.org/10.1145/568760.568827.
Full text