Volltext-Artikel, eBooks und vieles mehr aus dem EBSCO Discovery Service

Das Gesuchte nicht gefunden? Schauen Sie in der Onleihe oder machen Sie einen Kaufvorschlag

Treffer 21 - 40 von 2.936

21

Decompiling Boolean Expressions from Java Bytecode
Nanda, Mangala Gowri ; Arun-Kumar, S.
Proceedings of the 9th India Software Engineering Conference. :59-69

Konferenz
22

Graft: Static Analysis of Java Bytecode with Graph Databases
Keirsgieter, Wim ; Visser, Willem
Conference of the South African Institute of Computer Scientists and Information Technologists 2020. :217-226

Konferenz
23

Java bytecode clone detection via relaxation on code fingerprint and Semantic Web reasoning
Keivanloo, Iman ; Roy, Chanchai K. ; Rilling, Juergen
2012 6th International Workshop on Software Clones (IWSC) Software Clones (IWSC), 2012 6th International Workshop on. :36-42 Jun, 2012

Konferenz
24

CIL to Java-Bytecode Translation for Static Analysis Leveraging
Ferrara, Pietro ; Cortesi, Agostino ; Spoto, Fausto
2018 IEEE/ACM 6th International FME Workshop on Formal Methods in Software Engineering (FormaliSE) FORMALISE Formal Methods in Software Engineering (FormaliSE), 2018 IEEE/ACM 6th International FME Workshop on. :40-49 May, 2018

Konferenz
25

Java bytecode to hardware made easy with bluespec system verilog
Gruian, Flavius ; Arslan, Mehmet Ali
Proceedings of the 10th International Workshop on Java Technologies for Real-time and Embedded Systems. :80-87

Konferenz
26

Activating mobile agents from contactless smart cards through a Java bytecode extractor
Lee, Jonathan ; Lee, Shin-Jie ; Chen, Hsi-Min ; et al.
2010 IEEE International Conference on Systems, Man and Cybernetics Systems Man and Cybernetics (SMC), 2010 IEEE International Conference on. :3948-3951 Oct, 2010

Konferenz
27

Stack Bound Inference for Abstract Java Bytecode
Wang, Shengyi ; Qiu, Zongyan ; Qin, Shengchao ; et al.
2010 4th IEEE International Symposium on Theoretical Aspects of Software Engineering Theoretical Aspects of Software Engineering (TASE), 2010 4th IEEE International Symposium on. :57-66 Aug, 2010

Konferenz
28

Application requirements and efficiency of embedded Java bytecode multi-cores
Zabel, Martin ; Spallek, Rainer G.
Proceedings of the 8th International Workshop on Java Technologies for Real-Time and Embedded Systems. :46-52

Konferenz
29

Coverage-Based Debloating for Java Bytecode
Soto-Valero, César ; Durieux, Thomas ; Harrand, Nicolas ; et al.

Computer Science - Softw...
Report
30

Removing useless variables in cost analysis of Java bytecode
Albert, E. ; Arenas, P. ; Genaim, S. ; et al.
Proceedings of the 2008 ACM symposium on Applied computing. :368-375

Konferenz
31

An evaluation of output from current Java bytecode decompilers: Is it Android which is responsible for such quality boost?
Kostelansky, Jozef ; Dedera, Lubomir
2017 Communication and Information Technologies (KIT) Communication and Information Technologies (KIT), 2017. :1-6 Oct, 2017

Konferenz
32

Heap space analysis for java bytecode
Albert, Elvira ; Genaim, Samir ; Gomez-Zamalloa, Miguel
Proceedings of the 6th international symposium on Memory management. :105-116

Konferenz
33

Java bytecode verification on Java cards
Barbuti, Roberto ; Cataudella, Stefano
Proceedings of the 2004 ACM symposium on Applied computing. :431-438

Konferenz
34

Estimating the time complexity of the algorithms by counting the Java bytecode instructions
Dobravec, Tomaz
2017 IEEE 14th International Scientific Conference on Informatics Informatics, 2017 IEEE 14th International Scientific Conference on. :74-79 Nov, 2017

Konferenz
35

Java bytecode as a typed term calculus
Higuchi, Tomoyuki ; Ohori, Atsushi
Proceedings of the 4th ACM SIGPLAN international conference on Principles and practice of declarative programming. :201-211

Konferenz
36

Checking security of Java bytecode by abstract interpretation
Barbuti, Roberto ; Bernardeschi, Cinzia ; De Francesco, Nicoletta
Proceedings of the 2002 ACM symposium on Applied computing. :229-236

Konferenz
37

A termination analyzer for Java bytecode based on path-length
Spoto, Fausto ; Mesnard, Fred ; Payet, Étienne
ACM Transactions on Programming Languages and Systems (TOPLAS). 32(3):1-70

Fachzeitschrift
38

J-Viz: Finding algorithmic complexity attacks via graph visualization of Java bytecode
Alam, Md. Jawaherul ; Goodrich, Michael T. ; Johnson, Timothy
2016 IEEE Symposium on Visualization for Cyber Security (VizSec) Visualization for Cyber Security (VizSec), 2016 IEEE Symposium on. :1-8 Oct, 2016

Konferenz
39

SNITCH: Dynamic Dependent Information Flow Analysis for Independent Java Bytecode
Geraldo, Eduardo ; Seco, João Costa
EPTCS 302, 2019, pp. 16-31

Computer Science - Softw... Computer Science - Progr...
Report
40

Data-Flow Based Analysis of Java Bytecode Vulnerability
Zhao, Gang ; Chen, Hua ; Wang, Dongxia
2008 The Ninth International Conference on Web-Age Information Management Web-Age Information Management, 2008. WAIM '08. The Ninth International Conference on. :647-653 Jul, 2008

Konferenz

Filter