Výsledky vyhledávání - Java byte codes~

  1. 1

    An Empirical Study of a Hybrid Code Clone Detection Approach on Java Byte Code Autor Ghosh, Aritra, Lee, Young

    ISSN: 2010-2283, 2251-3043
    Vydáno: Singapore Global Science and Technology Forum 01.01.2017
    “… We conduct a case study on two open source code Java projects such as Eclipse-ant and Eclipse-JDT core to show the effectiveness of our tool…”
    Získat plný text
    Journal Article
  2. 2

    Locating SQL Injection Vulnerabilities in Java Byte Code Using Natural Language Techniques Autor Jackson, Kevin A., Bennett, Brian T.

    ISSN: 1558-058X
    Vydáno: IEEE 01.04.2018
    Vydáno v SoutheastCon 2018 (01.04.2018)
    “… problems. Other methods of finding software vulnerabilities automatically are required. This proof-of-concept study applied natural language processing on Java byte code to locate…”
    Získat plný text
    Konferenční příspěvek
  3. 3

    Enhancing quality of code smell detection on java byte code Autor Ghosh, Aritra

    ISBN: 1339394545, 9781339394541
    Vydáno: ProQuest Dissertations & Theses 01.01.2015
    “…A software clone occurs when two code fragments are identical to each other in the source code…”
    Získat plný text
    Dissertation
  4. 4

    Combinatorial Validation Testing of Java Card Byte Code Verifiers Autor Calvagna, Andrea, Tramontana, Emiliano

    ISBN: 1479904058, 9781479904051
    ISSN: 1524-4547
    Vydáno: IEEE 01.06.2013
    “…We present a technique to fully automate validation of a byte code verifier (BCV) implementation by testing…”
    Získat plný text
    Konferenční příspěvek
  5. 5

    Open-Source Java Code Coverage using Source and Byte Code Instruments: An Experimental Analysis Autor Gupta, Varuna, Srivastava, Shilpa

    ISSN: 1303-5150
    Vydáno: Bornova Izmir NeuroQuantology 01.01.2022
    Vydáno v NeuroQuantology (01.01.2022)
    “…The software testers inherently face the challenges of code coverage while designing test cases…”
    Získat plný text
    Journal Article
  6. 6

    An Efficient Code Clone Detection Model on Java Byte Code Using Hybrid Approach Autor Raheja, K, Tekchandani, R.K

    ISBN: 9781849198462, 1849198462
    Vydáno: Stevenage, UK IET 2013
    “… Software cloning is a perception in which source code is duplicated. Code clones and its detection is one of the emerging and most dominant areas of research in the field of software engineering…”
    Získat plný text
    Konferenční příspěvek
  7. 7

    A Tree-Based Alternative to Java Byte-Codes Autor Kistler, Thomas, Franz, Michael

    ISSN: 0885-7458, 1573-7640
    Vydáno: New York, NY Plenum Press 01.02.1999
    “… than software transported via Java byte-codes. This is true even if the Java byte-codes are subsequently further translated into native code…”
    Získat plný text
    Journal Article
  8. 8

    Security monitor inlining and certification for multithreaded Java Autor DAM, MADS, JACOBS, BART, LUNDBLAD, ANDREAS, PIESSENS, FRANK

    ISSN: 0960-1295, 1469-8072, 1469-8072
    Vydáno: Cambridge, UK Cambridge University Press 01.03.2015
    “…Security monitor inlining is a technique for security policy enforcement whereby monitor functionality is injected into application code in the style of aspect-oriented programming…”
    Získat plný text
    Journal Article
  9. 9

    Byte-code scheduling of Java programs with branches for desktop grid Autor Laskowski, Eryk, Tudruj, Marek, Olejnik, Richard, Toursel, Bernard

    ISSN: 0167-739X, 1872-7115
    Vydáno: Elsevier B.V 01.11.2007
    Vydáno v Future generation computer systems (01.11.2007)
    “…) inside desktop grids is presented. It is composed of two stages. In the first stage, a clustering algorithm is applied to extended macro data flow graphs generated on the basis of the byte-code compiled for multithreaded Java programs…”
    Získat plný text
    Journal Article
  10. 10

    Proof-carrying code from certified abstract interpretation and fixpoint compression Autor Besson, Frédéric, Jensen, Thomas, Pichardie, David

    ISSN: 0304-3975, 1879-2294
    Vydáno: Amsterdam Elsevier B.V 08.11.2006
    Vydáno v Theoretical computer science (08.11.2006)
    “… The PCC architecture has been implemented and evaluated experimentally on a byte code language for which we have designed an interval analysis that allows to generate certificates ascertaining that no array-out-of-bounds accesses will occur…”
    Získat plný text
    Journal Article Konferenční příspěvek
  11. 11

    The Strengths and Behavioral Quirks of Java Bytecode Decompilers Autor Harrand, Nicolas, Soto-Valero, Cesar, Monperrus, Martin, Baudry, Benoit

    ISSN: 2470-6892
    Vydáno: IEEE 01.09.2019
    “…During compilation from Java source code to bytecode, some information is irreversibly lost…”
    Získat plný text
    Konferenční příspěvek
  12. 12

    Generating control flow graph from Java card byte code Autor Amine, Achkar, Mohammed, Benattou, Jean-Louis, Lanet

    ISSN: 2327-185X
    Vydáno: IEEE 01.10.2014
    “… from the byte code of java-card applications…”
    Získat plný text
    Konferenční příspěvek
  13. 13

    Deadlock-Detection in Java-Library Using Static-Analysis Autor Shanbhag, V.K.

    ISBN: 0769534465, 9780769534466
    ISSN: 1530-1362
    Vydáno: IEEE 01.12.2008
    “…Well-written Java programs that conform to the Language and the J2SE-API Specifications can surprisingly deadlock their hosting JVM…”
    Získat plný text
    Konferenční příspěvek
  14. 14

    Side channel analysis techniques towards a methodology for reverse engineering of Java Card byte-code Autor Kasmi, Mohammed Amine, Azizi, Mostafa, Lanet, Jean-Louis

    Vydáno: IEEE 01.12.2015
    “… Recently, these methods are used in the aim of reverse engineering program code on Java Card…”
    Získat plný text
    Konferenční příspěvek
  15. 15

    Portable worst-case execution time analysis using Java Byte Code Autor Bernat, G., Burns, A., Wellings, A.

    ISBN: 9780769507347, 0769507344
    ISSN: 1068-3070
    Vydáno: IEEE 2000
    “…Addresses the problem of performing worst-case execution time (WCET) analysis of Java Byte Code (JBC…”
    Získat plný text
    Konferenční příspěvek
  16. 16
  17. 17

    Java Core Permits Direct Java Byte-Code Execution Autor Vollmer, Alfred

    ISSN: 0013-4872, 1944-9550
    Vydáno: Nashville Endeavor Business Media 30.10.2000
    Vydáno v Electronic design (30.10.2000)
    Získat plný text
    Magazine Article
  18. 18

    Java Byte Code Scheduling Based on the Most-Often-Used-Paths in Programs with Branches Autor Laskowski, E., Tudruj, M., Olejnik, R., Toursel, B.

    ISBN: 0769524346, 9780769524344
    ISSN: 2379-5352
    Vydáno: IEEE 2005
    “… These dependencies are discovered by an analysis of program byte code and stored in the form of relevant macro/dataflow graphs…”
    Získat plný text
    Konferenční příspěvek
  19. 19

    Low-level analysis of a portable Java byte code WCET analysis framework Autor Bate, I., Bernat, G., Murphy, G., Puschner, P.

    ISBN: 0769509304, 9780769509303
    ISSN: 1530-1427
    Vydáno: IEEE 2000
    “…To support portability, worst-case execution time (WCET) analysis of Java byte code is performed at two levels - machine-independent program flow analysis…”
    Získat plný text
    Konferenční příspěvek
  20. 20

    Automatic Generation of Vulnerability Tests for the Java Card Byte Code Verifier Autor Savary, A., Frappier, M., Lanet, J.

    ISBN: 9781457707353, 1457707357
    Vydáno: IEEE 01.05.2011
    “…The byte code verifier is an essential component of the Java Card security platform…”
    Získat plný text
    Konferenční příspěvek