Suchergebnisse - Java bytecode accounting
-
1
Autoren:
Quelle: Electronic Notes in Theoretical Computer Science. 141:53-73
-
2
Autoren:
Weitere Verfasser:
Schlagwörter: General Terms Management, Performance, Reliability, Security, Languages Keywords Java, Resource Management, Bytecode Engineering, Program Transformations
Dateibeschreibung: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.8836; http://www.jraf2.org/publications/PEPM04.pdf
-
3
Autoren:
Schlagwörter: jraf2, Java, CPU Accounting, Real-Time, Bytecode Engineering, Program Transformations, Resource Management
Relation: 11th ECOOP Workshop on Mobile Object Systems; https://infoscience.epfl.ch/handle/20.500.14299/217107
-
4
Autoren: et al.
Quelle: ACM Transactions on Software Engineering & Methodology; Mar2023, Vol. 32 Issue 2, p1-34, 34p
Schlagwörter: SOFTWARE maintenance
-
5
Autoren: et al.
Quelle: Applied Sciences (2076-3417); Sep2023, Vol. 13 Issue 17, p9580, 17p
Schlagwörter: SOFTWARE engineering, SURGICAL gloves, SOURCE code, SYSTEMS software
-
6
Autoren:
Quelle: Software: Practice & Experience; Feb2020, Vol. 50 Issue 2, p136-160, 25p
-
7
Autoren:
Quelle: Parallel Computing. May2007, Vol. 33 Issue 4/5, p314-327. 14p.
-
8
Autoren:
Quelle: ENTCS: Electronic Notes in Theoretical Computer Science. May2006, Vol. 153 Issue 2, p57-77. 21p.
Schlagwörter: Computer software development, Computer programming, Algorithms, Computer industry
-
9
Autoren:
Quelle: Computers (2073-431X); Jun2022, Vol. 11 Issue 6, p96-N.PAG, 29p
-
10
Autoren: Arora, Jaspreet Singh
Schlagwörter: Computer science, Computer engineering, code bloat, code size reduction, code transformation, debloat, jshrink, software engineering
Dateibeschreibung: application/pdf
-
11
Autoren:
Quelle: Journal of Software: Evolution & Process; May2017, Vol. 29 Issue 5, pn/a-N.PAG, 1p
-
12
Autoren:
Quelle: ACM SIGPLAN Notices. 36:139-155
-
13
Autoren:
Weitere Verfasser:
Quelle: ftp://cui.unige.ch/pub/tios/papers/OOPSLA2001.pdf
Schlagwörter: resource
Dateibeschreibung: application/pdf
-
14
Autoren: et al.
Quelle: ECOOP 2005 - Object-Oriented Programming; 2005, p362-386, 25p
-
15
Autoren:
Quelle: Higher-Order & Symbolic Computation; Jun2008, Vol. 21 Issue 1/2, p119-146, 28p
-
16
Autoren:
Quelle: IEEE Internet Computing; Sep/Oct2004, Vol. 8 Issue 5, p74-83, 10p, 10 Diagrams
-
17
Autoren: et al.
Quelle: ICSE: International Conference on Software Engineering; 2024, p1-13, 13p
Schlagwörter: INSTITUTIONAL repositories, JAVA programming language, SOFTWARE engineering, AUTOMATION, COMPUTER software
-
18
Autoren:
Quelle: Journal of Cybersecurity & Privacy; Dec2025, Vol. 5 Issue 4, p109, 27p
Schlagwörter: MALWARE, SIGNAL detection, DEEP learning, N-gram models (Computational linguistics), ENTROPY
Reviews & Products: ANDROID (Operating system)
-
19
Autoren: et al.
Quelle: ACM Transactions on Software Engineering & Methodology; May2025, Vol. 34 Issue 4, p1-33, 33p
-
20
Autoren: et al.
Quelle: Software Engineering & Middleware; 2005, p154-169, 16p
Full Text Finder
Nájsť tento článok vo Web of Science