Academic literature on the topic 'Java bytecode'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Java bytecode.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Java bytecode"

1

Gal, Andreas, Christian W. Probst, and Michael Franz. "Integrated Java Bytecode Verification." Electronic Notes in Theoretical Computer Science 131 (May 2005): 27–38. http://dx.doi.org/10.1016/j.entcs.2005.01.020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kim, Ki-Tae, Je-Min Kim, and Weon-Hee Yoo. "Implementation of Java Bytecode Framework." Journal of the Korea Contents Association 10, no. 3 (2010): 122–31. http://dx.doi.org/10.5392/jkca.2010.10.3.122.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Reynolds, Mark C. "Modeling the Java Bytecode Verifier." Science of Computer Programming 78, no. 3 (2013): 327–42. http://dx.doi.org/10.1016/j.scico.2011.03.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bertelsen, Peter. "Dynamic semantics of Java bytecode." Future Generation Computer Systems 16, no. 7 (2000): 841–50. http://dx.doi.org/10.1016/s0167-739x(99)00094-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cook, J. J. "Reverse Execution of Java Bytecode." Computer Journal 45, no. 6 (2002): 608–19. http://dx.doi.org/10.1093/comjnl/45.6.608.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhao, Jian-jun. "Static analysis of Java bytecode." Wuhan University Journal of Natural Sciences 6, no. 1-2 (2001): 383–90. http://dx.doi.org/10.1007/bf03160273.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Iqbal, Adeel, and Minhaj Ahmad Khan. "Optimizing Storage Space on Embedded Systems Using Superinstructions." STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH 6, no. 2 (2024): 219–36. https://doi.org/10.52700/scir.v6i2.164.

Full text
Abstract:
Embedded systems are gaining popularity as the devices get smarter and customized with time. But still, embedded systems have limitations in their available resources such as storage and processing capability. This study investigates the role of superinstructions in optimizing the storage space of Java-based applications for embedded systems. JVM must also be optimized to meet embedded systems’ limited resources. This research introduces the JEOpt framework (Java Embedded Optimization framework) to systematically analyze Java bytecode, identify basic blocks, compute effectiveness of superinstr
APA, Harvard, Vancouver, ISO, and other styles
8

Dobravec, Tomaž. "JAVA BYTECODE INSTRUCTION USAGE COUNTING WITH ALGATOR." Acta Electrotechnica et Informatica 18, no. 4 (2018): 17–25. http://dx.doi.org/10.15546/aeei-2018-0028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Tao, and Abhik Roychoudhury. "Dynamic slicing on Java bytecode traces." ACM Transactions on Programming Languages and Systems 30, no. 2 (2008): 1–49. http://dx.doi.org/10.1145/1330017.1330021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chan, Jien-Tsai, and Wuu Yang. "Advanced obfuscation techniques for Java bytecode." Journal of Systems and Software 71, no. 1-2 (2004): 1–10. http://dx.doi.org/10.1016/s0164-1212(02)00066-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Java bytecode"

1

Batchelder, Michael Robert. "Java bytecode obfuscation." Thesis, McGill University, 2007. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=18300.

Full text
Abstract:
Programs written for machine execution will always be susceptible to information theft. This information can include trademarked algorithms, data embedded in the program, or even data the program accesses. As technology advances computer scientists are building more and more powerful tools for reverse-engineering such as decompilers.The Java programming language is particularly open to reverse-engineering attacks because of its well-defined, open, and portable binary format. We examine one area of better-securing the intellectual property of a Java program; obfuscation. Obfuscation of a progra
APA, Harvard, Vancouver, ISO, and other styles
2

Klein, Gerwin. "Verified Java bytecode verification." [S.l. : s.n.], 2003. http://deposit.ddb.de/cgi-bin/dokserv?idn=967128749.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shah, Rahul Arvind. "Vulnerability assessment of Java bytecode." Auburn, Ala., 2005. http://repo.lib.auburn.edu/Send%2012-16-07/SHAH_RAHUL_44.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ochani, Vidit. "Java bytecode to Pilar translator." Kansas State University, 2013. http://hdl.handle.net/2097/16987.

Full text
Abstract:
Master of Science<br>Department of Computing and Information Sciences<br>Robby<br>Software technology is the pivot around which all modern industries revolve. It is not surprising that industries of diverse nature such as finance, business, engineering, medicine, defense, etc. have assimilated sophisticated software in every step of functioning. Subsequently, with larger reach of application, software technology has evolved intricately; thereby thwarting the desirable testing of software. Companies are investing millions of dollars in manual and automated testing, however, software bugs contin
APA, Harvard, Vancouver, ISO, and other styles
5

Doyon, Stéphane. "On the security of Java, the Java bytecode verifier." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0004/MQ41890.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Vallee-Rai, Raja. "Soot : a java bytecode optimization framework." Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=30836.

Full text
Abstract:
Java provides many attractive features such as platform independence, execution safety, garbage collection and object orientation. These features facilitate application development but are expensive to support; applications written in Java are often much slower than their counterparts written in C or C++. To use these features without having to pay a great performance penalty, sophisticated optimizations and runtime systems are required.<br>We present SOOT, a framework for optimizing Java bytecode. The framework is implemented in Java and supports three intermediate representations for represe
APA, Harvard, Vancouver, ISO, and other styles
7

Pinto, Camara Tarcisio. "Otimização bytecode Java na plataforma J2ME." Universidade Federal de Pernambuco, 2004. https://repositorio.ufpe.br/handle/123456789/2567.

Full text
Abstract:
Made available in DSpace on 2014-06-12T15:59:18Z (GMT). No. of bitstreams: 2 arquivo5023_1.pdf: 1253051 bytes, checksum: 0bb4a72739c259711e027e24c5f3659f (MD5) license.txt: 1748 bytes, checksum: 8a4605be74aa9ea9d79846c1fba20a33 (MD5) Previous issue date: 2004<br>Conselho Nacional de Desenvolvimento Científico e Tecnológico<br>Aplicações para os dispositivos móveis, como telefones celulares e pagers, implementadas em J2ME (Java 2 Micro Edition) são desenvolvidas sob severas restrições de tamanho e desempenho do código. A indústria tem adotado ferramentas de otimização, como obfuscators e s
APA, Harvard, Vancouver, ISO, and other styles
8

Modesto, Francisco. "Development of a Java Bytecode Front-End." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-6210.

Full text
Abstract:
<p>The VizzAnalyzer is a powerful software analysis tool. It is able to extract information from various software representations like source code  but also other specifications like UML. The extracted information is input to static analysis of these software projects. One programming language the VizzAnalyzer can extract information from is Java source code.</p><p>Analyzing the source code is sufficient for most of the analysis. But, sometimes it is necessary to analyze compiled classes either because the program is only available in byte-code, or the scope of analysis includes libraries that
APA, Harvard, Vancouver, ISO, and other styles
9

Zabel, Martin. "Effiziente Mehrkernarchitektur für eingebettete Java-Bytecode-Prozessoren." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2012. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-84156.

Full text
Abstract:
Die Java-Plattform bietet viele Vorteile für die schnelle Entwicklung komplexer Software. Für die Ausführung des Java-Bytecodes auf eingebetteten Systemen eignen sich insbesondere Java-(Bytecode)-Prozessoren, die den Java-Bytecode als nativen Befehlssatz unterstützen. Die vorliegende Arbeit untersucht detailliert die Gestaltung einer Mehrkernarchitektur für Java-Prozessoren zur effizienten Nutzung der auf Thread-Ebene ohnehin vorhandenen Parallelität eines Java-Programms. Für die Funktionalitäts- und Leistungsbewertung eines Prototyps wird eine eigene Trace-Architektur eingesetzt. Es wird eine
APA, Harvard, Vancouver, ISO, and other styles
10

Zabel, Martin, and Rainer G. Spallek. "SHAP — Scalable Multi-Core Java Bytecode Processor." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2012. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-97619.

Full text
Abstract:
Abstract This paper introduces a new embedded Java multi-core architecture which shows a significantly better performance for a large number of cores than the related projects JopCMP and jamuth IP multi-core. The cores gain fast access to the shared heap by a fullduplex bus with pipelined transactions. Each core is equipped with local on-chip memory for the Java operand stack and the method cache to further reduce the memory bandwidth requirements. As opposed to the related projects, synchronization is supported on a per object-basis instead of a single lock. Load balancing is implemented in J
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Java bytecode"

1

Lew, Dion. BCIR: A framework for the representation and manipulation of the Java bytecode. 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Java bytecode"

1

Stärk, Robert F., Joachim Schmid, and Egon Börger. "Bytecode type assignments." In Java and the Java Virtual Machine. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/978-3-642-59495-3_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Czarnik, Patryk, Jacek Chrząszcz, and Aleksy Schubert. "A Java Bytecode Formalisation." In Lecture Notes in Computer Science. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03592-1_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fischer, Robert. "Lambdas in Java Bytecode." In Java Closures and Lambda. Apress, 2015. http://dx.doi.org/10.1007/978-1-4302-5999-2_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Albert, Elvira, Puri Arenas, Michael Codish, Samir Genaim, Germán Puebla, and Damiano Zanardini. "Termination Analysis of Java Bytecode." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-68863-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Brockschmidt, Marc, Carsten Otto, Christian von Essen, and Jürgen Giesl. "Termination Graphs for Java Bytecode." In Verification, Induction, Termination Analysis. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17172-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Laneve, Cosimo, and Abel Garcia. "Deadlock Detection of Java Bytecode." In Logic-Based Program Synthesis and Transformation. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94460-9_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Leroy, Xavier. "Java Bytecode Verification: An Overview." In Computer Aided Verification. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44585-4_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Albert, E., P. Arenas, S. Genaim, G. Puebla, and D. Zanardini. "Cost Analysis of Java Bytecode." In Programming Languages and Systems. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-71316-6_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tanter, Éric, Marc Ségura-Devillechaise, Jacques Noyé, and José Piquer. "Altering Java Semantics via Bytecode Manipulation." In Generative Programming and Component Engineering. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45821-2_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Genaim, Samir, and Fausto Spoto. "Information Flow Analysis for Java Bytecode." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-30579-8_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Java bytecode"

1

Barbuti, Roberto, and Stefano Cataudella. "Java bytecode verification on Java cards." In the 2004 ACM symposium. ACM Press, 2004. http://dx.doi.org/10.1145/967900.967991.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Binder, Walter, Jarle Hulaas, and Philippe Moret. "Advanced Java bytecode instrumentation." In the 5th international symposium. ACM Press, 2007. http://dx.doi.org/10.1145/1294325.1294344.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vincenzi, A. M. R., M. E. Delamaro, A. S. Simão, W. E. Wong, and J. C. Maldonado. "JaBÁ: A Java Bytecoder Analyser." In Simpósio Brasileiro de Engenharia de Software. Sociedade Brasileira de Computação, 2002. http://dx.doi.org/10.5753/sbes.2002.23968.

Full text
Abstract:
Many existing control-flow and data-flow based techniques for software testing and program analysis require source code instrumentation. However, this approach may not be feasible for component-based software as some of its components can be commercial off-the-shelf products or developed by a third party, and therefore the corresponding source code is not always available. For programs written in Java, this problem can be solved by conducting instrumentation directly on bytecode, instead of on the Java source code. In this paper, we present a Java Bytecode Analyzer (JaBÁ), developed to help pr
APA, Harvard, Vancouver, ISO, and other styles
4

Burdy, Lilian, and Mariela Pavlova. "Java bytecode specification and verification." In the 2006 ACM symposium. ACM Press, 2006. http://dx.doi.org/10.1145/1141277.1141708.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lance, Don, Roland H. Untch, and Nancy J. Wahl. "Bytecode-based Java program analysis." In the 37th annual Southeast regional conference (CD-ROM). ACM Press, 1999. http://dx.doi.org/10.1145/306363.306382.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ribeiro, José Carlos Bregieiro, Francisco Fernández de Vega, and Mário Zenha-Rela. "Using Dynamic Analysis Of Java Bytecode For Evolutionary Object-Oriented Unit Testing." In Workshop de Testes e Tolerância a Falhas. Sociedade Brasileira de Computação - SBC, 2007. http://dx.doi.org/10.5753/wtf.2007.23245.

Full text
Abstract:
The focus of this paper is on presenting a methodology for generating and optimizing test data by employing evolutionary search techniques, with basis on the information provided by the analysis and interpretation of Java bytecode and on the dynamic execution of the instrumented test object. The main reason to work at the bytecode level is that even when the source code is unavailable, structural testing requirements can still be derived and used to assess the quality of a given test set and to guide the evolutionary search towards reaching specific test goals. Java bytecode retains enough hig
APA, Harvard, Vancouver, ISO, and other styles
7

"JSIMIL - A Java Bytecode Clone Detector." In 5th International Conference on Software and Data Technologies. SciTePress - Science and and Technology Publications, 2010. http://dx.doi.org/10.5220/0003013403330336.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zambon, Andrea. "Aucsmith-Like Obfuscation of Java Bytecode." In 2012 12th IEEE Working Conference on Source Code Analysis and Manipulation (SCAM). IEEE, 2012. http://dx.doi.org/10.1109/scam.2012.14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Octeau, Damien, Somesh Jha, and Patrick McDaniel. "Retargeting Android applications to Java bytecode." In the ACM SIGSOFT 20th International Symposium. ACM Press, 2012. http://dx.doi.org/10.1145/2393596.2393600.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Santone, Antonella, and Gigliola Vaglini. "Local model checking of Java bytecode." In the 14th international conference. ACM Press, 2002. http://dx.doi.org/10.1145/568760.568827.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!