Search Results - "Java virtual machine."
-
1
Authors:
Source: 2024 IEEE Secure Development Conference (SecDev). :153-165
-
2
Authors: et al.
Contributors: et al.
Subject Terms: Data parallelism, Offloading, Processing-in-Memory, ddc:004, Java VM
File Description: application/pdf
-
3
Authors: et al.
Source: 2023 30th Asia-Pacific Software Engineering Conference (APSEC). :607-611
-
4
Authors: et al.
Source: 2023 5th International Conference on Frontiers Technology of Information and Computer (ICFTIC). :241-244
-
5
Authors: et al.
Contributors: et al.
Source: 2020 43rd International Convention on Information, Communication and Electronic Technology (MIPRO). :1752-1757
Subject Terms: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, Structured Concurrency, Fibers, Java, Java Virtual Machine, Threads, Delimited Continuations
-
6
Authors: et al.
Source: 2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW). :371-373
-
7
Authors:
Source: ACM Transactions on Programming Languages and Systems. 41:1-47
Subject Terms: performance analysis and optimization, actionable profiles, Task granularity, 0202 electrical engineering, electronic engineering, information engineering, vertical profiling, Java Virtual Machine, 02 engineering and technology, task parallelism
Access URL: http://doc.rero.ch/record/322969/files/2018INFO008.pdf
https://doc.rero.ch/record/322969
https://doc.rero.ch/record/322969/files/2018INFO008.pdf
https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=202002248819366820
https://dl.acm.org/doi/10.1145/3338497
https://dblp.uni-trier.de/db/journals/toplas/toplas41.html#RosaRB19
https://dl.gi.de/handle/20.500.12116/31724 -
8
Authors:
Index Terms: C/C++ vulnerabilities, cfi, control flow integrity, jvm, memory corruption, security methodology, Computer Sciences, Datavetenskap (datalogi), Conference paper, info:eu-repo/semantics/conferenceObject, text
URL:
http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-232765
Proceedings - 2024 IEEE Secure Development Conference, SecDev 2024, p. 153-165 -
9
Authors: et al.
-
10
Authors: et al.
Source: 2021 Third International Conference on Blockchain Computing and Applications (BCCA). :187-194
Subject Terms: smart contract, software reengineering, blockchain, token, ERC-20, smart contract, software reengineering, blockchain, token, ERC-20
File Description: application/pdf
-
11
Authors:
Source: Journal of Computer Sciences Institute, Vol 13 (2019)
Subject Terms: garbage collecting, Java Virtual Machine, application performance, Electronic computers. Computer science, 0202 electrical engineering, electronic engineering, information engineering, Information technology, QA75.5-76.95, 02 engineering and technology, T58.5-58.64
-
12
Authors: et al.
Source: 2021 IEEE 21st International Conference on Software Quality, Reliability and Security (QRS). :586-597
Subject Terms: Computer science [C05] [Engineering, computing & technology], 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, Sciences informatiques [C05] [Ingénierie, informatique & technologie]
Access URL: http://orbilu.uni.lu/handle/10993/48983
-
13
Authors:
Source: Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing. :1258-1267
-
14
-
15
Authors:
Source: Companion of the ACM/SPEC International Conference on Performance Engineering. :183-186
-
16
-
17
Authors: et al.
Source: Lecture Notes in Networks and Systems ISBN: 9783031379628
-
18
Authors: et al.
Source: Journal of Software: Evolution and Process. 36
-
19
-
20
Authors: Katarzyna Buszewicz
Source: Journal of Computer Sciences Institute, Vol 15 (2020)
Subject Terms: Scala, Electronic computers. Computer science, Information technology, QA75.5-76.95, JVM, T58.5-58.64, Java, Kotlin
Nájsť tento článok vo Web of Science
Full Text Finder