Journal articles on the topic 'Java bytecode'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Java bytecode.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Gal, Andreas, Christian W. Probst, and Michael Franz. "Integrated Java Bytecode Verification." Electronic Notes in Theoretical Computer Science 131 (May 2005): 27–38. http://dx.doi.org/10.1016/j.entcs.2005.01.020.
Full textKim, Ki-Tae, Je-Min Kim, and Weon-Hee Yoo. "Implementation of Java Bytecode Framework." Journal of the Korea Contents Association 10, no. 3 (2010): 122–31. http://dx.doi.org/10.5392/jkca.2010.10.3.122.
Full textReynolds, Mark C. "Modeling the Java Bytecode Verifier." Science of Computer Programming 78, no. 3 (2013): 327–42. http://dx.doi.org/10.1016/j.scico.2011.03.008.
Full textBertelsen, Peter. "Dynamic semantics of Java bytecode." Future Generation Computer Systems 16, no. 7 (2000): 841–50. http://dx.doi.org/10.1016/s0167-739x(99)00094-1.
Full textCook, J. J. "Reverse Execution of Java Bytecode." Computer Journal 45, no. 6 (2002): 608–19. http://dx.doi.org/10.1093/comjnl/45.6.608.
Full textZhao, Jian-jun. "Static analysis of Java bytecode." Wuhan University Journal of Natural Sciences 6, no. 1-2 (2001): 383–90. http://dx.doi.org/10.1007/bf03160273.
Full textIqbal, Adeel, and Minhaj Ahmad Khan. "Optimizing Storage Space on Embedded Systems Using Superinstructions." STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH 6, no. 2 (2024): 219–36. https://doi.org/10.52700/scir.v6i2.164.
Full textDobravec, Tomaž. "JAVA BYTECODE INSTRUCTION USAGE COUNTING WITH ALGATOR." Acta Electrotechnica et Informatica 18, no. 4 (2018): 17–25. http://dx.doi.org/10.15546/aeei-2018-0028.
Full textWang, Tao, and Abhik Roychoudhury. "Dynamic slicing on Java bytecode traces." ACM Transactions on Programming Languages and Systems 30, no. 2 (2008): 1–49. http://dx.doi.org/10.1145/1330017.1330021.
Full textChan, Jien-Tsai, and Wuu Yang. "Advanced obfuscation techniques for Java bytecode." Journal of Systems and Software 71, no. 1-2 (2004): 1–10. http://dx.doi.org/10.1016/s0164-1212(02)00066-3.
Full textGhosh, Sudipto, and John L. Kelly. "Bytecode fault injection for Java software." Journal of Systems and Software 81, no. 11 (2008): 2034–43. http://dx.doi.org/10.1016/j.jss.2008.02.047.
Full textChrząszcz, Jacek, Patryk Czarnik, and Aleksy Schubert. "A Dozen Instructions Make Java Bytecode." Electronic Notes in Theoretical Computer Science 264, no. 4 (2011): 19–34. http://dx.doi.org/10.1016/j.entcs.2011.02.003.
Full textLeroy, Xavier. "Bytecode verification on Java smart cards." Software: Practice and Experience 32, no. 4 (2002): 319–40. http://dx.doi.org/10.1002/spe.438.
Full textEichberg, Michael. "BAT2XML: XML-based Java Bytecode Representation." Electronic Notes in Theoretical Computer Science 141, no. 1 (2005): 93–107. http://dx.doi.org/10.1016/j.entcs.2005.02.035.
Full textLi, Zhiming, Qing Wu, and Kun Qian. "Adabot: Fault-Tolerant Java Decompiler (Student Abstract)." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 10 (2020): 13861–62. http://dx.doi.org/10.1609/aaai.v34i10.7203.
Full textJiang, Long Long, and Dai Ping Li. "Using Contour Marking Bytecode Verification Algorithm on the Java Card." Applied Mechanics and Materials 556-562 (May 2014): 4120–23. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.4120.
Full textOgata, Kazunori, Hideaki Komatsu, and Toshio Nakatani. "Bytecode fetch optimization for a Java interpreter." ACM SIGARCH Computer Architecture News 30, no. 5 (2002): 58–67. http://dx.doi.org/10.1145/635506.605404.
Full textOgata, Kazunori, Hideaki Komatsu, and Toshio Nakatani. "Bytecode fetch optimization for a Java interpreter." ACM SIGOPS Operating Systems Review 36, no. 5 (2002): 58–67. http://dx.doi.org/10.1145/635508.605404.
Full textMunsil, Wes, and Chia-Jiu Wang. "Reducing stack usage in Java bytecode execution." ACM SIGARCH Computer Architecture News 26, no. 1 (1998): 7–11. http://dx.doi.org/10.1145/1216461.1216464.
Full textQian, Zhenyu. "Standard fixpoint iteration for Java bytecode verification." ACM Transactions on Programming Languages and Systems 22, no. 4 (2000): 638–72. http://dx.doi.org/10.1145/363911.363915.
Full textDoyon, S., and M. Debbabi. "On object initialization in the Java bytecode." Computer Communications 23, no. 17 (2000): 1594–605. http://dx.doi.org/10.1016/s0140-3664(00)00245-0.
Full textOgata, Kazunori, Hideaki Komatsu, and Toshio Nakatani. "Bytecode fetch optimization for a Java interpreter." ACM SIGPLAN Notices 37, no. 10 (2002): 58–67. http://dx.doi.org/10.1145/605432.605404.
Full textAvvenuti, Marco, Cinzia Bernardeschi, and Nicoletta De Francesco. "Java bytecode verification for secure information flow." ACM SIGPLAN Notices 38, no. 12 (2003): 20–27. http://dx.doi.org/10.1145/966051.966055.
Full textStata, Raymie, and Martin Abadi. "A type system for Java bytecode subroutines." ACM Transactions on Programming Languages and Systems 21, no. 1 (1999): 90–137. http://dx.doi.org/10.1145/314602.314606.
Full textVincenzi, A. M. R., M. E. Delamaro, J. C. Maldonado, and W. E. Wong. "Establishing structural testing criteria for Java bytecode." Software: Practice and Experience 36, no. 14 (2006): 1513–41. http://dx.doi.org/10.1002/spe.726.
Full textCollberg, Christian, Ginger Myles, and Michael Stepp. "An empirical study of Java bytecode programs." Software: Practice and Experience 37, no. 6 (2007): 581–641. http://dx.doi.org/10.1002/spe.776.
Full textMeehan, Gary, and Mike Joy. "Compiling lazy functional programs to Java bytecode." Software: Practice and Experience 29, no. 7 (1999): 617–45. http://dx.doi.org/10.1002/(sici)1097-024x(199906)29:7<617::aid-spe250>3.0.co;2-e.
Full textAlbert, E., P. Arenas, S. Genaim, G. Puebla, and D. Zanardini. "Experiments in Cost Analysis of Java Bytecode." Electronic Notes in Theoretical Computer Science 190, no. 1 (2007): 67–83. http://dx.doi.org/10.1016/j.entcs.2007.02.061.
Full textBernardeschi, C., N. De Francesco, G. Lettieri, and L. Martini. "Checking secure information flow in Java bytecode by code transformation and standard bytecode verification." Software: Practice and Experience 34, no. 13 (2004): 1225–55. http://dx.doi.org/10.1002/spe.611.
Full textSherman, Elena, Yannic Noller, Cyrille Artho, et al. "The Java Pathfinder Workshop 2022." ACM SIGSOFT Software Engineering Notes 48, no. 1 (2023): 19–21. http://dx.doi.org/10.1145/3573074.3573080.
Full textHaase, Oliver. "Abstract Interpretation of Java Bytecode for Immutability Analysis." Journal of Computer Science 12, no. 7 (2016): 314–22. http://dx.doi.org/10.3844/jcssp.2016.314.322.
Full textClausen, Lars Ræder, Ulrik Pagh Schultz, Charles Consel, and Gilles Muller. "Java bytecode compression for low-end embedded systems." ACM Transactions on Programming Languages and Systems 22, no. 3 (2000): 471–89. http://dx.doi.org/10.1145/353926.353933.
Full textJipping, Michael J., Cameron Calka, Brian O'Neill, and Christopher R. Padilla. "Teaching students java bytecode using lego mindstorms robots." ACM SIGCSE Bulletin 39, no. 1 (2007): 170–74. http://dx.doi.org/10.1145/1227504.1227371.
Full textGal, Andreas, Christian W. Probst, and Michael Franz. "Java bytecode verification via static single assignment form." ACM Transactions on Programming Languages and Systems 30, no. 4 (2008): 1–21. http://dx.doi.org/10.1145/1377492.1377496.
Full textBARTHE, GILLES, DAVID PICHARDIE, and TAMARA REZK. "A certified lightweight non-interference Java bytecode verifier." Mathematical Structures in Computer Science 23, no. 5 (2013): 1032–81. http://dx.doi.org/10.1017/s0960129512000850.
Full textPayet, Étienne, and Fausto Spoto. "Experiments with Non-Termination Analysis for Java Bytecode." Electronic Notes in Theoretical Computer Science 253, no. 5 (2009): 83–96. http://dx.doi.org/10.1016/j.entcs.2009.11.016.
Full textSpoto, Fausto, and Étienne Payet. "Magic-sets for localised analysis of Java bytecode." Higher-Order and Symbolic Computation 23, no. 1 (2010): 29–86. http://dx.doi.org/10.1007/s10990-010-9063-7.
Full textMcGhan, H., and M. O'Connor. "PicoJava: a direct execution engine for Java bytecode." Computer 31, no. 10 (1998): 22–30. http://dx.doi.org/10.1109/2.722273.
Full textKnoblock, Todd B., and Jakob Rehof. "Type elaboration and subtype completion for Java bytecode." ACM Transactions on Programming Languages and Systems 23, no. 2 (2001): 243–72. http://dx.doi.org/10.1145/383043.383045.
Full textCoglio, Alessandro. "Improving the official specification of Java bytecode verification." Concurrency and Computation: Practice and Experience 15, no. 2 (2003): 155–79. http://dx.doi.org/10.1002/cpe.714.
Full textCoglio, Alessandro. "Simple verification technique for complex Java bytecode subroutines." Concurrency and Computation: Practice and Experience 16, no. 7 (2004): 647–70. http://dx.doi.org/10.1002/cpe.798.
Full textClausen, Lars R. "A Java bytecode optimizer using side-effect analysis." Concurrency: Practice and Experience 9, no. 11 (1997): 1031–45. http://dx.doi.org/10.1002/(sici)1096-9128(199711)9:11<1031::aid-cpe354>3.0.co;2-o.
Full textBernardeschi, Cinzia, Giuseppe Lettieri, Luca Martini, and Paolo Masci. "A Space-Aware Bytecode Verifier for Java Cards." Electronic Notes in Theoretical Computer Science 141, no. 1 (2005): 237–54. http://dx.doi.org/10.1016/j.entcs.2005.02.027.
Full textBinder, Walter, and Jarle Hulaas. "Java Bytecode Transformations for Efficient, Portable CPU Accounting." Electronic Notes in Theoretical Computer Science 141, no. 1 (2005): 53–73. http://dx.doi.org/10.1016/j.entcs.2005.02.037.
Full textLambert, Jonathan, Rosemary Monahan, and Kevin Casey. "Accidental Choices—How JVM Choice and Associated Build Tools Affect Interpreter Performance." Computers 11, no. 6 (2022): 96. http://dx.doi.org/10.3390/computers11060096.
Full textGAMESS, ERIC. "EXECUTION OF SEQUENTIAL AND PARALLEL JAVA BYTECODE IN A METACOMPUTING SYSTEM." Parallel Processing Letters 13, no. 01 (2003): 53–64. http://dx.doi.org/10.1142/s0129626403001148.
Full textVartanov, S. P., and M. K. Ermakov. "Applying Java bytecode static instrumentation for software dynamic analysis." Proceedings of the Institute for System Programming of the RAS 27, no. 1 (2015): 25–38. http://dx.doi.org/10.15514/ispras-2015-27(1)-2.
Full textPapadimitriou, Stergios, Seferina Mavroudi, Kostas Theofilatos, and Spiridon Likothanasis. "MATLAB-Like Scripting of Java Scientific Libraries in ScalaLab." Scientific Programming 22, no. 3 (2014): 187–99. http://dx.doi.org/10.1155/2014/570902.
Full textBockisch, Christoph, Gabriele Taentzer, Nebras Nassar, and Lukas Wydra. "Java Bytecode Verification with OCL Why, How and Whenc." Journal of Object Technology 19, no. 3 (2020): 3:1. http://dx.doi.org/10.5381/jot.2020.19.3.a13.
Full textAchour, Safaa, Ali Chouenyib, and Mohammed Benattou. "A Constraint-Based Verification Approach for Java Bytecode Programs." International Journal of Software Engineering and Its Applications 12, no. 2 (2018): 1–17. http://dx.doi.org/10.14257/ijseia.2018.12.2.01.
Full text