Search Results - denotational semantics Java byte-code~
-
1
Authors:
Contributors:
Source: Higher-Order and Symbolic Computation. 23:29-86
Subject Terms: denotational semantics Java byte-code, Other programming paradigms (object-oriented, sequential, concurrent, automatic, etc.), Mathematical aspects of software engineering (specification, verification, metrics, requirements, etc.), Semantics in the theory of computing, Magic-sets, abstract interpretation, static analysis, denotational semantics, [MATH] Mathematics [math], 0102 computer and information sciences, 02 engineering and technology, [INFO] Computer Science [cs], 01 natural sciences, magic-sets, 0202 electrical engineering, electronic engineering, information engineering
File Description: application/pdf; application/xml
Access URL: https://hal.univ-reunion.fr/hal-01186160/file/Magic_sets_for_localised_analysis_of_java_bytecode.pdf
https://hal.univ-reunion.fr/hal-01186160v1/document
https://hal.univ-reunion.fr/hal-01186160v1
https://doi.org/10.1007/s10990-010-9063-7
https://hdl.handle.net/11562/341536
https://doi.org/10.1007/s10990-010-9063-7 -
2
Authors:
Source: International Journal on Software Tools for Technology Transfer; Aug2024, Vol. 26 Issue 4, p445-461, 17p
Subject Terms: SEMANTICS
-
3
-
4
Authors: et al.
Source: Generative & Transformational Techniques in Software Engineering IV; 2013, p322-345, 24p
-
5
Authors: Jim Alves-Foss
Resource Type: eBook.
Categories: COMPUTERS / Programming / Compilers, COMPUTERS / Computer Science, COMPUTERS / Software Development & Engineering / General
-
6
Authors:
Source: IEEE Transactions on Software Engineering; Sep2000, Vol. 26 Issue 9, p872-887, 16p
-
7
Authors:
Source: New Generation Computing; Mar2002, Vol. 20 Issue 1, p53-73, 21p
-
8
Authors: Spoto, Fausto
Source: Software & Systems Modeling; May2011, Vol. 10 Issue 2, p219-252, 34p, 11 Diagrams, 2 Charts
-
9
Source: From Semantics to Computer Science; 2009, p337-362, 26p
-
10
Authors: et al.
Source: Software: Practice & Experience; May2013, Vol. 43 Issue 5, p479-499, 21p
-
11
Authors:
Source: International Journal of Foundations of Computer Science; Aug2003, Vol. 14 Issue 4, p659, 22p
-
12
-
13
Authors: Favre, Liliana
Source: Reliable Software Technologies - Ada-europe 2009; 2009, p177-191, 15p
-
14
Authors:
Source: Cluster Computing; Nov2019 Supplement 6, Vol. 22, p14049-14059, 11p
Subject Terms: SOFTWARE frameworks, SECURITY systems, MOBILE apps
-
15
Authors: Breitner, Joachim
Source: ACM / SIGPLAN Notices; Dec2015, Vol. 50 Issue 12, p35-46, 12p
-
16
Authors: Chalin, Patrice
Source: Proceedings of the 2014 IEEE 15th International Conference on Information Reuse & Integration (IEEE IRI 2014); 2014, p369-377, 9p
-
17
Authors: Zawawy, Mohamed A. El
Source: 2014 14th International Conference on Computational Science & Its Applications; 2014, p12-17, 6p
-
18
Authors: Fritzson, Peter
Source: Principles of Object Oriented Modeling & Simulation with Modelica 3.3; 2014, p1029-1060, 32p
-
19
Authors:
Source: Leveraging Applications of Formal Methods; 2006, p74-95, 22p
-
20
Authors: et al.
Source: Higher-Order & Symbolic Computation; Sep2000, Vol. 13 Issue 3, p161-178, 18p
Nájsť tento článok vo Web of Science
Full Text Finder