Search Results - "Java bytecode"

  • Showing 1 - 4 results of 4
Refine Results
  1. 1

    Secure the Clones by Jensen, Thomas, Kirchner, Florent, Pichardie, David

    ISSN: 1860-5974, 1860-5974
    Published: Logical Methods in Computer Science Association 31.05.2012
    Published in Logical methods in computer science (31.05.2012)
    “… It may not provide a sufficiently deep copy of an object and is subject to overriding by a malicious sub-class…”
    Get full text
    Journal Article
  2. 2

    Extracting Domain Behaviors Through Multi-Criteria, Polymorphism-Inspired Variability Analysis by Abbas, Sameh, עאס, סאמח

    ISBN: 9798351489049
    Published: ProQuest Dissertations & Theses 01.01.2022
    “…Extracting domain knowledge is important for different purposes. These include Software Product Line (SPL) engineering, whose main activities involve domain…”
    Get full text
    Dissertation
  3. 3

    Shadow Symbolic Execution with Java PathFinder by Noller, Yannic, Hoang Lam Nguyen, Tang, Minxing, Kehrer, Timo

    ISSN: 2331-8422
    Published: Ithaca Cornell University Library, arXiv.org 05.02.2018
    Published in arXiv.org (05.02.2018)
    “…) project to perform shadow symbolic execution on Java bytecode. The extension has been applied on several subjects from the JPF test classes where it successfully generated test inputs that expose divergences relevant for regression testing…”
    Get full text
    Paper
  4. 4

    The K virtual machine and the Palm V, Part 1; Java has a reputation for being big -- really big -- especially in its memory consumption, but as the new KVM reminds us, it didn't start out that way by McManis, Chuck

    ISSN: 1091-8906, 1091-8906
    Published: San Francisco Foundry 01.09.1999
    Published in Java world (01.09.1999)
    “…Java started life as an operating system environment for a handheld device called the *7 ("star seven"). The *7 had only a couple of megabytes of flash memory…”
    Get full text
    Magazine Article