Výsledky vyhledávání - Java byte codes~
-
1
An Empirical Study of a Hybrid Code Clone Detection Approach on Java Byte Code
ISSN: 2010-2283, 2251-3043Vydáno: Singapore Global Science and Technology Forum 01.01.2017Vydáno v GSTF International journal on computing (01.01.2017)“… We conduct a case study on two open source code Java projects such as Eclipse-ant and Eclipse-JDT core to show the effectiveness of our tool…”
Získat plný text
Journal Article -
2
Locating SQL Injection Vulnerabilities in Java Byte Code Using Natural Language Techniques
ISSN: 1558-058XVydáno: IEEE 01.04.2018Vydáno v SoutheastCon 2018 (01.04.2018)“… problems. Other methods of finding software vulnerabilities automatically are required. This proof-of-concept study applied natural language processing on Java byte code to locate…”
Získat plný text
Konferenční příspěvek -
3
Enhancing quality of code smell detection on java byte code
ISBN: 1339394545, 9781339394541Vydáno: ProQuest Dissertations & Theses 01.01.2015“…A software clone occurs when two code fragments are identical to each other in the source code…”
Získat plný text
Dissertation -
4
Combinatorial Validation Testing of Java Card Byte Code Verifiers
ISBN: 1479904058, 9781479904051ISSN: 1524-4547Vydáno: IEEE 01.06.2013Vydáno v 2013 Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (01.06.2013)“…We present a technique to fully automate validation of a byte code verifier (BCV) implementation by testing…”
Získat plný text
Konferenční příspěvek -
5
Open-Source Java Code Coverage using Source and Byte Code Instruments: An Experimental Analysis
ISSN: 1303-5150Vydáno: Bornova Izmir NeuroQuantology 01.01.2022Vydáno v NeuroQuantology (01.01.2022)“…The software testers inherently face the challenges of code coverage while designing test cases…”
Získat plný text
Journal Article -
6
An Efficient Code Clone Detection Model on Java Byte Code Using Hybrid Approach
ISBN: 9781849198462, 1849198462“… Software cloning is a perception in which source code is duplicated. Code clones and its detection is one of the emerging and most dominant areas of research in the field of software engineering…”Vydáno: Stevenage, UK IET 2013
Získat plný text
Konferenční příspěvek -
7
A Tree-Based Alternative to Java Byte-Codes
ISSN: 0885-7458, 1573-7640Vydáno: New York, NY Plenum Press 01.02.1999Vydáno v International journal of parallel programming (01.02.1999)“… than software transported via Java byte-codes. This is true even if the Java byte-codes are subsequently further translated into native code…”
Získat plný text
Journal Article -
8
Security monitor inlining and certification for multithreaded Java
ISSN: 0960-1295, 1469-8072, 1469-8072Vydáno: Cambridge, UK Cambridge University Press 01.03.2015Vydáno v Mathematical structures in computer science (01.03.2015)“…Security monitor inlining is a technique for security policy enforcement whereby monitor functionality is injected into application code in the style of aspect-oriented programming…”
Získat plný text
Journal Article -
9
Byte-code scheduling of Java programs with branches for desktop grid
ISSN: 0167-739X, 1872-7115Vydáno: Elsevier B.V 01.11.2007Vydáno v Future generation computer systems (01.11.2007)“…) inside desktop grids is presented. It is composed of two stages. In the first stage, a clustering algorithm is applied to extended macro data flow graphs generated on the basis of the byte-code compiled for multithreaded Java programs…”
Získat plný text
Journal Article -
10
Proof-carrying code from certified abstract interpretation and fixpoint compression
ISSN: 0304-3975, 1879-2294Vydáno: Amsterdam Elsevier B.V 08.11.2006Vydáno v Theoretical computer science (08.11.2006)“… The PCC architecture has been implemented and evaluated experimentally on a byte code language for which we have designed an interval analysis that allows to generate certificates ascertaining that no array-out-of-bounds accesses will occur…”
Získat plný text
Journal Article Konferenční příspěvek -
11
The Strengths and Behavioral Quirks of Java Bytecode Decompilers
ISSN: 2470-6892Vydáno: IEEE 01.09.2019Vydáno v Proceedings / IEEE International Working Conference on Source Code Analysis and Manipulation (01.09.2019)“…During compilation from Java source code to bytecode, some information is irreversibly lost…”
Získat plný text
Konferenční příspěvek -
12
Generating control flow graph from Java card byte code
ISSN: 2327-185XVydáno: IEEE 01.10.2014Vydáno v Colloquium in Information Science and Technology (Print) (01.10.2014)“… from the byte code of java-card applications…”
Získat plný text
Konferenční příspěvek -
13
Deadlock-Detection in Java-Library Using Static-Analysis
ISBN: 0769534465, 9780769534466ISSN: 1530-1362Vydáno: IEEE 01.12.2008Vydáno v 2008 15th Asia-Pacific Software Engineering Conference (01.12.2008)“…Well-written Java programs that conform to the Language and the J2SE-API Specifications can surprisingly deadlock their hosting JVM…”
Získat plný text
Konferenční příspěvek -
14
Side channel analysis techniques towards a methodology for reverse engineering of Java Card byte-code
Vydáno: IEEE 01.12.2015Vydáno v 2015 11th International Conference on Information Assurance and Security (IAS) (01.12.2015)“… Recently, these methods are used in the aim of reverse engineering program code on Java Card…”
Získat plný text
Konferenční příspěvek -
15
Portable worst-case execution time analysis using Java Byte Code
ISBN: 9780769507347, 0769507344ISSN: 1068-3070“…Addresses the problem of performing worst-case execution time (WCET) analysis of Java Byte Code (JBC…”Vydáno: IEEE 2000
Získat plný text
Konferenční příspěvek -
16
Jumble Java Byte Code to Measure the Effectiveness of Unit Tests
ISBN: 0769529844, 9780769529844“…Jumble is a byte code level mutation testing tool for Java which inter-operates with JUnit…”Vydáno: IEEE 01.09.2007
Získat plný text
Konferenční příspěvek -
17
Java Core Permits Direct Java Byte-Code Execution
ISSN: 0013-4872, 1944-9550Vydáno: Nashville Endeavor Business Media 30.10.2000Vydáno v Electronic design (30.10.2000)Získat plný text
Magazine Article -
18
Java Byte Code Scheduling Based on the Most-Often-Used-Paths in Programs with Branches
ISBN: 0769524346, 9780769524344ISSN: 2379-5352“… These dependencies are discovered by an analysis of program byte code and stored in the form of relevant macro/dataflow graphs…”Vydáno: IEEE 2005
Získat plný text
Konferenční příspěvek -
19
Low-level analysis of a portable Java byte code WCET analysis framework
ISBN: 0769509304, 9780769509303ISSN: 1530-1427Vydáno: IEEE 2000Vydáno v Seventh International Conference on Real-Time Computing Systems and Applications : proceedings : 12-14 December, 2000, Cheju Island, South Korea (2000)“…To support portability, worst-case execution time (WCET) analysis of Java byte code is performed at two levels - machine-independent program flow analysis…”
Získat plný text
Konferenční příspěvek -
20
Automatic Generation of Vulnerability Tests for the Java Card Byte Code Verifier
ISBN: 9781457707353, 1457707357Vydáno: IEEE 01.05.2011Vydáno v 2011 Conference on Network and Information Systems Security (01.05.2011)“…The byte code verifier is an essential component of the Java Card security platform…”
Získat plný text
Konferenční příspěvek

