Volltext-Artikel, eBooks und vieles mehr aus dem EBSCO Discovery Service

Das Gesuchte nicht gefunden? Schauen Sie in der Onleihe oder machen Sie einen Kaufvorschlag

Treffer 41 - 60 von 2.936

41

The Vulnerability Analysis Framework for Java Bytecode
Hong, Tang ; Hua, Chen ; Gang, Zhao ; et al.
2009 15th International Conference on Parallel and Distributed Systems Parallel and Distributed Systems (ICPADS), 2009 15th International Conference on. :896-901 Dec, 2009

Konferenz
42

Levels of Binary Equivalence for the Comparison of Binaries from Alternative Builds
Dietrich, Jens ; White, Tim ; Hassanshahi, Behnaz ; et al.
2025 IEEE International Conference on Software Maintenance and Evolution (ICSME) ICSME Software Maintenance and Evolution (ICSME), 2025 IEEE International Conference on. :576-587 Sep, 2025

Konferenz
43

Java bytecode compression for low-end embedded systems
Clausen, Lars Ræder ; Schultz, Ulrik Pagh ; Consel, Charles ; et al.
ACM Transactions on Programming Languages and Systems (TOPLAS). 22(3):471-489

Fachzeitschrift
44

Mining Test Oracles for Test Inputs Generated from Java Bytecode
Xu, Weifeng ; Ding, Tao ; Wang, Hanlin ; et al.
2013 IEEE 37th Annual Computer Software and Applications Conference Computer Software and Applications Conference (COMPSAC), 2013 IEEE 37th Annual. :27-32 Jul, 2013

Konferenz
45

A markup language for java bytecode
You, Liang ; Lu, Yansheng
2012 International Conference on Systems and Informatics (ICSAI2012) Systems and Informatics (ICSAI), 2012 International Conference on. :2420-2424 May, 2012

Konferenz
46

Using 'must' and 'may' summaries to detect data races in Java bytecode that does not rely on the synchronized construct
Clarke, David A. W. ; Miller, Tim ; Mendoza, Antonette
Proceedings of the ASWEC 2015 24th Australasian Software Engineering Conference. :64-68

Konferenz
47

WCET analysis of Java bytecode featuring common execution environments
Frost, Christian ; Jensen, Casper Svenning ; Luckow, Kasper Søe ; et al.
Proceedings of the 9th International Workshop on Java Technologies for Real-Time and Embedded Systems. :30-39

Konferenz
48

Constraint-Based Test Input Generation for Java Bytecode
Charreteur, Florence ; Gotlieb, Arnaud
2010 IEEE 21st International Symposium on Software Reliability Engineering Software Reliability Engineering (ISSRE), 2010 IEEE 21st International Symposium on. :131-140 Nov, 2010

Konferenz
49

PET : a partial evaluation-based test case generation tool for Java bytecode
Albert, Elvira ; Gómez-Zamalloa, Miguel ; Puebla, Germán
Proceedings of the 2010 ACM SIGPLAN workshop on Partial evaluation and program manipulation. :25-28

Konferenz
50

Deadlock detection of Java Bytecode
Garcia, Abel ; Laneve, Cosimo

Computer Science - Progr...
Report
51

JaBEE : framework for object-oriented Java bytecode compilation and execution on graphics processor units
Zaremba, Wojciech ; Lin, Yuan ; Grover, Vinod
Proceedings of the 5th Annual Workshop on General Purpose Processing with Graphics Processing Units. :74-83

Konferenz
52

Aucsmith-Like Obfuscation of Java Bytecode
Zambon, Andrea
2012 IEEE 12th International Working Conference on Source Code Analysis and Manipulation Source Code Analysis and Manipulation (SCAM), 2012 IEEE 12th International Working Conference on. :114-119 Sep, 2012

Konferenz
53

Research on Java Bytecode Parse and Obfuscate Tool
Yang, L. ; He, H.-J.
2012 International Conference on Computer Science and Service System Computer Science & Service System (CSSS), 2012 International Conference on. :50-53 Aug, 2012

Konferenz
54

A non-null annotation inferencer for Java bytecode
Hubert, Laurent
Proceedings of the 8th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering. :36-42

Konferenz
55

J-Viz: Sibling-First Recursive Graph Drawing for Visualizing Java Bytecode
Alam, Md. Jawaherul ; Goodrich, Michael T. ; Johnson, Timothy

Computer Science - Data...
Report
56

Teaching students java bytecode using lego mindstorms robots
Jipping, Michael J. ; Calka, Cameron ; O'Neill, Brian ; et al.
Proceedings of the 38th SIGCSE technical symposium on Computer science education. :170-174

Konferenz
57

Verification of java bytecode using analysis and transformation of logic programs
Albert, Elvira ; Gómez-Zamalloa, Miguel ; Hubert, Laurent ; et al.
Proceedings of the 9th international conference on Practical Aspects of Declarative Languages. :124-139

Konferenz
58

MiniLib: A flow analysis–based approach for attack surface reduction through software debloating
Kopanias, Loukas ; Sotiropoulos, Panagiotis ; Kolokotronis, Nicholas ; et al.
2025 IEEE International Conference on Cyber Security and Resilience (CSR) Cyber Security and Resilience (CSR), 2025 IEEE International Conference on. :260-266 Aug, 2025

Konferenz
59

Java bytecode specification and verification
Burdy, Lilian ; Pavlova, Mariela
Proceedings of the 2006 ACM symposium on Applied computing. :1835-1839

Konferenz
60

Abstract non-interference in a fragment of Java bytecode
Zanardini, Damiano
Proceedings of the 2006 ACM symposium on Applied computing. :1822-1826

Konferenz

Filter