Suchergebnisse - "Java bytecodes"
-
1
A software tool for semi-automatic gridification of resource-intensive Java bytecodes and its application to ray tracing and sequence alignment
ISSN: 0965-9978Veröffentlicht: Elsevier Ltd 01.04.2011Veröffentlicht in Advances in engineering software (1992) (01.04.2011)“… Computational Grids deliver the necessary computational infrastructure to perform resource-intensive computations such as the ones that solve the problems …”
Volltext
Journal Article -
2
Towards a Java bytecodes compiler for Nios II soft-core processor
ISBN: 9781424446728, 1424446724ISSN: 1530-1346Veröffentlicht: IEEE 01.07.2009Veröffentlicht in 2009 IEEE Symposium on Computers and Communications (01.07.2009)“… Reconfigurable computing is one of the most recent research topics in computer science. The Altera¿ Nios II soft-core processor can be included in a large set …”
Volltext
Tagungsbericht -
3
Optimizing Java bytecodes
ISSN: 1040-3108, 1096-9128Veröffentlicht: Chichester John Wiley & Sons, Ltd 01.06.1997Veröffentlicht in Concurrency (Chichester, England.) (01.06.1997)“… We have developed a research compiler for Java class files. The compiler, which we call Briki, is designed to test new compilation techniques. We focus on …”
Volltext
Journal Article -
4
An analytical POC stack operations folding for continuous and discontinuous Java bytecodes
ISSN: 1383-7621, 1873-6165Veröffentlicht: Amsterdam Elsevier B.V 01.09.2002Veröffentlicht in Journal of systems architecture (01.09.2002)“… The execution performance of a stack-based Java virtual machine (JVM) is limited by the true data dependency. To enhance the performance of the JVM, a stack …”
Volltext
Journal Article -
5
Annotating the Java bytecodes in support of optimization
ISSN: 1040-3108, 1096-9128Veröffentlicht: Chichester John Wiley & Sons, Ltd 01.11.1997Veröffentlicht in Concurrency (Chichester, England.) (01.11.1997)“… The difficulty, however, lies with the Java bytecodes. Their model of a simplistic, platform‐independent stack machine is well …”
Volltext
Journal Article -
6
A Verifier for Region-Annotated Java Bytecodes
ISSN: 1571-0661, 1571-0661Veröffentlicht: Elsevier B.V 05.12.2005Veröffentlicht in Electronic notes in theoretical computer science (05.12.2005)“… This paper presents a verifier for the memory-safe execution of extended Java bytecodes that support region-based memory management and explicit deallocation primitives …”
Volltext
Journal Article -
7
An instruction set extension for java bytecodes translation acceleration
ISBN: 1424419859, 9781424419852Veröffentlicht: IEEE 01.07.2008Veröffentlicht in 2008 International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation : IC-SAMOS 2008, July 21-24, 2008, Samos, Greece (01.07.2008)“… This paper presents an architecture extension to RISC processors that accelerates Java bytecodes translation …”
Volltext
Tagungsbericht -
8
Java runtime systems: characterization and architectural implications
ISSN: 0018-9340, 1557-9956Veröffentlicht: New York IEEE 01.02.2001Veröffentlicht in IEEE transactions on computers (01.02.2001)“… The Java Virtual Machine (JVM) is the cornerstone of Java technology and its efficiency in executing the portable Java bytecodes is crucial for the success of this technology …”
Volltext
Journal Article -
9
Symbolic PathFinder: integrating symbolic execution with model checking for Java bytecode analysis
ISSN: 0928-8910, 1573-7535Veröffentlicht: Boston Springer US 01.09.2013Veröffentlicht in Automated software engineering (01.09.2013)“… Symbolic PathFinder (SPF) is a software analysis tool that combines symbolic execution with model checking for automated test case generation and error detection in Java bytecode programs …”
Volltext
Journal Article -
10
Code coverage differences of Java bytecode and source code instrumentation tools
ISSN: 0963-9314, 1573-1367Veröffentlicht: New York Springer US 01.03.2019Veröffentlicht in Software quality journal (01.03.2019)“… Many software testing fields, like white-box testing, test case generation, test prioritization, and fault localization, depend on code coverage measurement …”
Volltext
Journal Article -
11
An Experimental Comparison of Clone Detection Techniques using Java Bytecode
ISSN: 2640-0715Veröffentlicht: IEEE 01.12.2022Veröffentlicht in Proceedings / Asia Pacific Software Engineering Conference (01.12.2022)“… It is generally accepted in Software Engineering that code clones - often the result of copy-and-paste of existing code - result in poorer maintainability of …”
Volltext
Tagungsbericht -
12
JAVA BYTECODE INSTRUCTION USAGE COUNTING WITH ALGATOR
ISSN: 1335-8243, 1338-3957Veröffentlicht: Sciendo 01.01.2019Veröffentlicht in Acta electrotechnica et informatica (01.01.2019)“… Development of algorithms for solving various kinds of computer related problems consists of several consecutive and possibly repetitive phases. The final and …”
Volltext
Journal Article -
13
Design, implementation, and application of GPU-based Java bytecode interpreters
ISSN: 2475-1421, 2475-1421Veröffentlicht: 01.10.2019Veröffentlicht in Proceedings of ACM on programming languages (01.10.2019)“… We present the design and implementation of GVM, the first system for executing Java bytecode entirely on GPUs …”
Volltext
Journal Article -
14
Modeling the Java Bytecode Verifier
ISSN: 0167-6423, 1872-7964Veröffentlicht: Elsevier B.V 01.03.2013Veröffentlicht in Science of computer programming (01.03.2013)“… It further describes a system for performing a security analysis on any block of Java bytecodes by converting these bytecodes into relation initializers in Alloy …”
Volltext
Journal Article -
15
SNITCH: Dynamic Dependent Information Flow Analysis for Independent Java Bytecode
ISSN: 2075-2180, 2075-2180Veröffentlicht: Open Publishing Association 27.08.2019Veröffentlicht in Electronic proceedings in theoretical computer science (27.08.2019)“… Software testing is the most commonly used technique in the industry to certify the correctness of software systems. This includes security properties like …”
Volltext
Journal Article -
16
Formal Model of Conformity Analysis Method of Java Bytecode Programs annotated with BML Specifications
ISSN: 1819-656X, 1819-9224Veröffentlicht: Hong Kong International Association of Engineers 17.05.2021Veröffentlicht in IAENG international journal of computer science (17.05.2021)“… This paper presents an analysis method of detecting the inconsistencies between a Java Bytecode program and its formal specification expressed at the Bytecode level, using the Bytecode Modeling Language (BML …”
Volltext
Journal Article -
17
An empirical study of Java bytecode programs
ISSN: 0038-0644, 1097-024XVeröffentlicht: Chichester, UK John Wiley & Sons, Ltd 01.05.2007Veröffentlicht in Software, practice & experience (01.05.2007)“… We present a study of the static structure of real Java bytecode programs. A total of 1132 Java jar …”
Volltext
Journal Article -
18
CIL to Java-Bytecode Translation for Static Analysis Leveraging
ISSN: 2575-5099Veröffentlicht: ACM 01.05.2018Veröffentlicht in 2018 IEEE/ACM 6th International FME Workshop on Formal Methods in Software Engineering (FormaliSE) (01.05.2018)“… A formal translation of CIL (i.e., .Net) bytecode into Java bytecode is introduced and proved sound with respect to the language semantics …”
Volltext
Tagungsbericht -
19
Vulnerabilities Constraint Based Analysis Approach for Java Bytecode Programs
ISSN: 2472-7652Veröffentlicht: IEEE 01.05.2018Veröffentlicht in Proceedings of the International Conference on Multimedia Computing and Systems (01.05.2018)“… The verification process of software is of growing importance as it helps to assure that an application is correctly built. However, an efficient verification …”
Volltext
Tagungsbericht -
20
Applying Java bytecode static instrumentation for software dynamic analysis
ISSN: 2079-8156, 2220-6426Veröffentlicht: Russian Academy of Sciences, Ivannikov Institute for System Programming 01.10.2018Veröffentlicht in Trudy Instituta sistemnogo programmirovaniâ (01.10.2018)“… This paper focuses on dynamic analysis of Java programs. We consider the following limitations: analysis tool may not have access to target program source …”
Volltext
Journal Article

