Volltext-Artikel, eBooks und vieles mehr aus dem EBSCO Discovery Service

Das Gesuchte nicht gefunden? Schauen Sie in der Onleihe oder machen Sie einen Kaufvorschlag

Treffer 21 - 40 von 280

21

Symbolic backward simulation of Java bytecode program
Inafune, Tetsuya ; Miura, Shinichi ; Taketa, Toshihiro ; et al.
Proceedings of the 10th International Conference on Computer Modeling and Simulation. :140-145

Konferenz
22

Test case generation for Java Bytecode programs annotated with BML specifications
Achour, Safaa ; Benattou, Mohammed
2016 5th International Conference on Multimedia Computing and Systems (ICMCS) Multimedia Computing and Systems (ICMCS), 2016 5th International Conference on. :605-610 Sep, 2016

Konferenz
23

Negative Effects of Bytecode Instrumentation on Java Source Code Coverage
Tengeri, David ; Horvath, Ferenc ; Beszedes, Arpad ; et al.
2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER) Software Analysis, Evolution, and Reengineering (SANER), 2016 IEEE 23rd International Conference on. 1:225-235 Mar, 2016

Konferenz
24

Backward range simulation of Java bytecodes and reduction of its processing time
Hiranaka, Yukio ; Inafune, Tetsuya ; Miura, Shinichi ; et al.
Proceedings of the 8th International Conference on Computer Modeling and Simulation. :129-133

Konferenz
25

Decompiling Boolean Expressions from Java Bytecode
Nanda, Mangala Gowri ; Arun-Kumar, S.
Proceedings of the 9th India Software Engineering Conference. :59-69

Konferenz
26

JavaPDG: A New Platform for Program Dependence Analysis
Shu, Gang ; Sun, Boya ; Henderson, Tim A.D. ; et al.
2013 IEEE Sixth International Conference on Software Testing, Verification and Validation Software Testing, Verification and Validation (ICST), 2013 IEEE Sixth International Conference on. :408-415 Mar, 2013

Konferenz
27

Instruction-Words Based Software Birthmark
Ma, Lianhong ; Wang, Yong ; Liu, Fenlin ; et al.
2012 Fourth International Conference on Multimedia Information Networking and Security Multimedia Information Networking and Security (MINES), 2012 Fourth International Conference on. :909-912 Nov, 2012

Konferenz
28

Java bytecode clone detection via relaxation on code fingerprint and Semantic Web reasoning
Keivanloo, Iman ; Roy, Chanchai K. ; Rilling, Juergen
2012 6th International Workshop on Software Clones (IWSC) Software Clones (IWSC), 2012 6th International Workshop on. :36-42 Jun, 2012

Konferenz
29

Checking Java Bugs by Data Propagation Analysis
Feng, Zhang Lu ; Hong, Tang ; Huan, Huang Min ; et al.
2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control Instrumentation, Measurement, Computer, Communication and Control, 2011 First International Conference on. :861-864 Oct, 2011

Konferenz
30

Activating mobile agents from contactless smart cards through a Java bytecode extractor
Lee, Jonathan ; Lee, Shin-Jie ; Chen, Hsi-Min ; et al.
2010 IEEE International Conference on Systems, Man and Cybernetics Systems Man and Cybernetics (SMC), 2010 IEEE International Conference on. :3948-3951 Oct, 2010

Konferenz
31

Stack Bound Inference for Abstract Java Bytecode
Wang, Shengyi ; Qiu, Zongyan ; Qin, Shengchao ; et al.
2010 4th IEEE International Symposium on Theoretical Aspects of Software Engineering Theoretical Aspects of Software Engineering (TASE), 2010 4th IEEE International Symposium on. :57-66 Aug, 2010

Konferenz
32

Soot class loading in the rootbeer GPU compiler
Pratt-Szeliga, Philip C. ; Laverdière, Marc-André ; Merlo, Ettore ; et al.
Proceedings of the 2nd ACM SIGPLAN International Workshop on State Of the Art in Java Program analysis. :19-24

Konferenz
33

Java bytecode to hardware made easy with bluespec system verilog
Gruian, Flavius ; Arslan, Mehmet Ali
Proceedings of the 10th International Workshop on Java Technologies for Real-time and Embedded Systems. :80-87

Konferenz
34

Application requirements and efficiency of embedded Java bytecode multi-cores
Zabel, Martin ; Spallek, Rainer G.
Proceedings of the 8th International Workshop on Java Technologies for Real-Time and Embedded Systems. :46-52

Konferenz
35

Parametric inference of memory requirements for garbage collected languages
Albert, Elvira ; Genaim, Samir ; Gómez-Zamalloa, Miguel
Proceedings of the 2010 international symposium on Memory management. :121-130

Konferenz
36

Genetic programming in the wild : evolving unrestricted bytecode
Orlov, Michael ; Sipper, Moshe
Proceedings of the 11th Annual conference on Genetic and evolutionary computation. :1043-1050

Konferenz
37

Live heap space analysis for languages with garbage collection
Albert, Elvira ; Genaim, Samir ; Gómez-Zamalloa Gil, Miguel
Proceedings of the 2009 international symposium on Memory management. :129-138

Konferenz
38

Removing useless variables in cost analysis of Java bytecode
Albert, E. ; Arenas, P. ; Genaim, S. ; et al.
Proceedings of the 2008 ACM symposium on Applied computing. :368-375

Konferenz
39

Pushing Java Type Obfuscation to the Limit
Foket, C. ; De Sutter, B. ; De Bosschere, K.
IEEE Transactions on Dependable and Secure Computing IEEE Trans. Dependable and Secure Comput. Dependable and Secure Computing, IEEE Transactions on. 11(6):553-567 Jan, 2014

Fachzeitschrift
40

Heap space analysis for java bytecode
Albert, Elvira ; Genaim, Samir ; Gomez-Zamalloa, Miguel
Proceedings of the 6th international symposium on Memory management. :105-116

Konferenz

Filter