Suchergebnisse - "Java bytecodes"

  1. 1

    Java runtime systems: characterization and architectural implications von Radhakrishnan, R., Vijaykrishnan, N., John, L.K., Sivasubramaniam, A., Rubio, J., Sabarinathan, J.

    ISSN: 0018-9340, 1557-9956
    Veröffentlicht: New York IEEE 01.02.2001
    Veröffentlicht in IEEE transactions on computers (01.02.2001)
    “… The Java Virtual Machine (JVM) is the cornerstone of Java technology and its efficiency in executing the portable Java bytecodes is crucial for the success of …”
    Volltext
    Journal Article
  2. 2

    Java decompiler diversity and its application to meta-decompilation von Harrand, Nicolas, Soto-Valero, César, Monperrus, Martin, Baudry, Benoit

    ISSN: 0164-1212, 1873-1228
    Veröffentlicht: Elsevier Inc 01.10.2020
    Veröffentlicht in The Journal of systems and software (01.10.2020)
    “… During compilation from Java source code to bytecode, some information is irreversibly lost. In other words, compilation and decompilation of Java code is not …”
    Volltext
    Journal Article
  3. 3

    Reasoning About Exceptional Behavior At the Level of Java Bytecode with ByteBack von Paganoni, Marco, Furia, Carlo A.

    ISSN: 0934-5043, 1433-299X
    Veröffentlicht: New York, NY ACM 04.11.2025
    Veröffentlicht in Formal aspects of computing (04.11.2025)
    “… A program’s exceptional behavior can substantially complicate its control flow, and hence accurately reasoning about the program’s correctness. On the other …”
    Volltext
    Journal Article
  4. 4

    Debloating Software Through Enhanced Static Analysis and Constraint Rules von Song, Xiaohu, Yu, Hai, Wang, Ying, Zhu, Zhiliang

    ISSN: 0038-0644, 1097-024X
    Veröffentlicht: Bognor Regis Wiley Subscription Services, Inc 01.10.2025
    Veröffentlicht in Software, practice & experience (01.10.2025)
    “… Introduction Java applications often bloat, consuming more resources than necessary. Existing bytecode debloating techniques have several limitations, such as …”
    Volltext
    Journal Article
  5. 5

    JAVA BYTECODE INSTRUCTION USAGE COUNTING WITH ALGATOR von Dobravec, Tomaž

    ISSN: 1335-8243, 1338-3957
    Veröffentlicht: Sciendo 01.01.2019
    Veröffentlicht in Acta electrotechnica et informatica (01.01.2019)
    “… Development of algorithms for solving various kinds of computer related problems consists of several consecutive and possibly repetitive phases. The final and …”
    Volltext
    Journal Article
  6. 6

    LibCapsule: Complete Confinement of Third-Party Libraries in Android Applications von Qiu, Jun, Yang, Xuewu, Wu, Huamao, Zhou, Yajin, Li, Jinku, Ma, Jianfeng

    ISSN: 1545-5971, 1941-0018
    Veröffentlicht: Washington IEEE 01.09.2022
    “… Android application (or app) developers increasingly integrate third-party libraries to enrich the functionality of their apps. However, current permission …”
    Volltext
    Journal Article
  7. 7

    SeByte: Scalable clone and similarity search for bytecode von Keivanloo, Iman, Roy, Chanchal K., Rilling, Juergen

    ISSN: 0167-6423, 1872-7964
    Veröffentlicht: Elsevier B.V 01.12.2014
    Veröffentlicht in Science of computer programming (01.12.2014)
    “… While source code clone detection is a well-established research area, finding similar code fragments in binary and other intermediate code representations has …”
    Volltext
    Journal Article
  8. 8

    Code coverage differences of Java bytecode and source code instrumentation tools von Horváth, Ferenc, Gergely, Tamás, Beszédes, Árpád, Tengeri, Dávid, Balogh, Gergő, Gyimóthy, Tibor

    ISSN: 0963-9314, 1573-1367
    Veröffentlicht: New York Springer US 01.03.2019
    Veröffentlicht in Software quality journal (01.03.2019)
    “… Many software testing fields, like white-box testing, test case generation, test prioritization, and fault localization, depend on code coverage measurement …”
    Volltext
    Journal Article
  9. 9

    Flight of the FINCH Through the Java Wilderness von Orlov, M, Sipper, M

    ISSN: 1089-778X, 1941-0026
    Veröffentlicht: New York, NY IEEE 01.04.2011
    Veröffentlicht in IEEE transactions on evolutionary computation (01.04.2011)
    “… We describe Fertile Darwinian Bytecode Harvester (FINCH), a methodology for evolving Java bytecode, enabling the evolution of extant, unrestricted Java …”
    Volltext
    Journal Article
  10. 10

    Detecting Java Code Clones Based on Bytecode Sequence Alignment von Yu, Dongjin, Yang, Jiazha, Chen, Xin, Chen, Jie

    ISSN: 2169-3536, 2169-3536
    Veröffentlicht: Piscataway IEEE 2019
    Veröffentlicht in IEEE access (2019)
    “… When the source code is copied and pasted or modified, there will be a lot of identical or similar code snippets in the software system, which are called code …”
    Volltext
    Journal Article
  11. 11

    RIM4J: An Architecture for Language-Supported Runtime Measurement against Malicious Bytecode in Cloud Computing von Ba, Haihe, Zhou, Huaizhe, Qiao, Huidong, Wang, Zhiying, Ren, Jiangchun

    ISSN: 2073-8994, 2073-8994
    Veröffentlicht: 01.07.2018
    Veröffentlicht in Symmetry (Basel) (01.07.2018)
    “… While cloud customers can benefit from migrating applications to the cloud, they are concerned about the security of the hosted applications. This is …”
    Volltext
    Journal Article
  12. 12

    Design, implementation, and application of GPU-based Java bytecode interpreters von Celik, Ahmet, Nie, Pengyu, Rossbach, Christopher J., Gligoric, Milos

    ISSN: 2475-1421, 2475-1421
    Veröffentlicht: 01.10.2019
    Veröffentlicht in Proceedings of ACM on programming languages (01.10.2019)
    “… We present the design and implementation of GVM, the first system for executing Java bytecode entirely on GPUs. GVM is ideal for applications that execute a …”
    Volltext
    Journal Article
  13. 13

    Conditional termination of loops over heap-allocated data von Albert, Elvira, Arenas, Puri, Genaim, Samir, Puebla, Germán, Román-Díez, Guillermo

    ISSN: 0167-6423, 1872-7964
    Veröffentlicht: Elsevier B.V 15.10.2014
    Veröffentlicht in Science of computer programming (15.10.2014)
    “… Static analysis which takes into account the values of data stored in the heap is considered complex and computationally intractable in practice. Thus, most …”
    Volltext
    Journal Article
  14. 14

    Verifying pointer programs using graph grammars von Heinen, Jonathan, Jansen, Christina, Katoen, Joost-Pieter, Noll, Thomas

    ISSN: 0167-6423, 1872-7964
    Veröffentlicht: Elsevier B.V 01.01.2015
    Veröffentlicht in Science of computer programming (01.01.2015)
    “… This paper argues that graph grammars naturally model dynamic data structures such as lists, trees and combinations thereof. These grammars can be exploited to …”
    Volltext
    Journal Article
  15. 15

    Vulnerabilities Constraint Based Analysis Approach for Java Bytecode Programs von Achour, Safaa, Benattou, Mohammed

    ISSN: 2472-7652
    Veröffentlicht: IEEE 01.05.2018
    “… The verification process of software is of growing importance as it helps to assure that an application is correctly built. However, an efficient verification …”
    Volltext
    Tagungsbericht
  16. 16

    Arden2ByteCode: A one-pass Arden Syntax compiler for service-oriented decision support systems based on the OSGi platform von Gietzelt, Matthias, Goltz, Ursula, Grunwald, Daniel, Lochau, Malte, Marschollek, Michael, Song, Bianying, Wolf, Klaus-Hendrik

    ISSN: 0169-2607, 1872-7565, 1872-7565
    Veröffentlicht: Ireland Elsevier Ireland Ltd 01.05.2012
    Veröffentlicht in Computer methods and programs in biomedicine (01.05.2012)
    “… ► We present Arden2ByteCode a newly developed open source compiler for the Arden Syntax. ► Direct one-pass translation to Java Bytecode provides fast …”
    Volltext
    Journal Article
  17. 17

    Java-MaC: A Run-Time Assurance Approach for Java Programs von Kim, MoonZoo, Viswanathan, Mahesh, Kannan, Sampath, Lee, Insup, Sokolsky, Oleg

    ISSN: 0925-9856, 1572-8102
    Veröffentlicht: 01.03.2004
    Veröffentlicht in Formal methods in system design (01.03.2004)
    “… We describe Java-MaC, a prototype implementation of the Monitoring and Checking (MaC) architecture for Java programs. The MaC architecture provides assurance …”
    Volltext
    Journal Article
  18. 18

    Heap space analysis for garbage collected languages von Albert, Elvira, Genaim, Samir, Gómez-Zamalloa, Miguel

    ISSN: 0167-6423, 1872-7964
    Veröffentlicht: Elsevier B.V 01.09.2013
    Veröffentlicht in Science of computer programming (01.09.2013)
    “… Accurately predicting the dynamic memory consumption (or heap space) of programs can be critical during software development. It is well-known that garbage …”
    Volltext
    Journal Article
  19. 19

    Applying dynamic analysis for defect detection in Java-applications von Sergey Vartanov, Alexander Gerasimov

    ISSN: 2079-8156, 2220-6426
    Veröffentlicht: Russian Academy of Sciences, Ivannikov Institute for System Programming 01.10.2018
    Veröffentlicht in Trudy Instituta sistemnogo programmirovaniâ (01.10.2018)
    “… This paper provides an overview of program analysis techniques and describes practical implementation of these techniques for automatic software defect …”
    Volltext
    Journal Article
  20. 20

    A method for detecting the theft of Java programs through analysis of the control flow information von Lim, Hyun-il, Park, Heewan, Choi, Seokwoo, Han, Taisook

    ISSN: 0950-5849, 1873-6025
    Veröffentlicht: Amsterdam Elsevier B.V 01.09.2009
    Veröffentlicht in Information and software technology (01.09.2009)
    “… A software birthmark refers to the inherent characteristics of a program that can be used to identify the program. In this paper, a method for detecting the …”
    Volltext
    Journal Article