Search Results - "Java bytecode"
-
1
Secure the Clones
ISSN: 1860-5974, 1860-5974Published: Logical Methods in Computer Science Association 31.05.2012Published in Logical methods in computer science (31.05.2012)“… It may not provide a sufficiently deep copy of an object and is subject to overriding by a malicious sub-class…”
Get full text
Journal Article -
2
Extracting Domain Behaviors Through Multi-Criteria, Polymorphism-Inspired Variability Analysis
ISBN: 9798351489049Published: ProQuest Dissertations & Theses 01.01.2022“…Extracting domain knowledge is important for different purposes. These include Software Product Line (SPL) engineering, whose main activities involve domain…”
Get full text
Dissertation -
3
Shadow Symbolic Execution with Java PathFinder
ISSN: 2331-8422Published: Ithaca Cornell University Library, arXiv.org 05.02.2018Published in arXiv.org (05.02.2018)“…) project to perform shadow symbolic execution on Java bytecode. The extension has been applied on several subjects from the JPF test classes where it successfully generated test inputs that expose divergences relevant for regression testing…”
Get full text
Paper -
4
The K virtual machine and the Palm V, Part 1; Java has a reputation for being big -- really big -- especially in its memory consumption, but as the new KVM reminds us, it didn't start out that way
ISSN: 1091-8906, 1091-8906Published: San Francisco Foundry 01.09.1999Published in Java world (01.09.1999)“…Java started life as an operating system environment for a handheld device called the *7 ("star seven"). The *7 had only a couple of megabytes of flash memory…”
Get full text
Magazine Article

