Volltext-Artikel, eBooks und vieles mehr aus dem EBSCO Discovery Service

Das Gesuchte nicht gefunden? Schauen Sie in der Onleihe oder machen Sie einen Kaufvorschlag

Treffer 61 - 80 von 2.950

61

JAVA BYTECODE INSTRUCTION USAGE COUNTING WITH ALGATOR
Tomaž DOBRAVEC
Acta Electrotechnica et Informatica, Vol 18, Iss 4, Pp 17-25 (2019)

Algorithm evaluation Java bytecode counting Electrical engineering.... TK1-9971
Fachzeitschrift
62

Dynamic slicing of Java bytecode programs
Szegedi, A. ; Gyimothy, T.
Fifth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM'05) Source Code Analysis and Manipulation Source Code Analysis and Manipulation, 2005. Fifth IEEE International Workshop on. :35-44 2005

Konferenz
63

Compiling C++ programs to Java bytecode
Gongzhu Hu ; Gadapa, A.
Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Network Software engineering, artificial intelligence, networking and parallel/distributed computing Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, 2005 and First ACIS International Workshop on Self-Assembling Wireless Networks. SNPD/SAWN 2005. Sixth International Conference on. :56-61 2005

Konferenz
64

Information flow analysis for java bytecode
Genaim, Samir ; Spoto, Fausto
Proceedings of the 6th international conference on Verification, Model Checking, and Abstract Interpretation. :346-362

Konferenz
65

Using data flow analysis to infer type information in Java bytecode
Maggi, P. ; Sisto, R.
Proceedings First IEEE International Workshop on Source Code Analysis and Manipulation Source code analysis Source Code Analysis and Manipulation, 2001. Proceedings. First IEEE International Workshop on. :211-222 2001

Konferenz
66

Retargeting Android applications to Java bytecode
Octeau, Damien ; Jha, Somesh ; McDaniel, Patrick
Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering. :1-11

Konferenz
67

Mobile code security by Java bytecode dependence analysis
Gaowei Bian ; Nakayama, K. ; Kobayashi, Y. ; et al.
IEEE International Symposium on Communications and Information Technology, 2004. ISCIT 2004. Communication and information technologies Communications and Information Technology, 2004. ISCIT 2004. IEEE International Symposium on. 2:923-926 vol.2 2004

Konferenz
68

A simplified java bytecode compilation system for resource-constrained embedded processors
Badea, Carmen ; Nicolau, Alexandru ; Veidenbaum, Alexander V.
Proceedings of the 2007 international conference on Compilers, architecture, and synthesis for embedded systems. :218-228

Konferenz
69

Dependence analysis of Java bytecode
Jianjun Zhao
Proceedings 24th Annual International Computer Software and Applications Conference. COMPSAC2000 Computer software and applications Computer Software and Applications Conference, 2000. COMPSAC 2000. The 24th Annual International. :486-491 2000

Konferenz
70

Supporting precise garbage collection in Java Bytecode-to-C ahead-of-time compiler for embedded systems
Jung, Dong-Heon ; Bae, Sung-Hwan ; Lee, Jaemok ; et al.
Proceedings of the 2006 international conference on Compilers, architecture and synthesis for embedded systems. :35-42

Konferenz
71

On instrumenting obfuscated java bytecode with aspects
Chen, Kung ; Chen, Ju-Bing
Proceedings of the 2006 international workshop on Software engineering for secure systems. :19-26

Konferenz
72

Using standard verifier to check secure information flow in Java bytecode
Bernardeschi, C. ; De Francesco, N. ; Lettieri, G.
Proceedings 26th Annual International Computer Software and Applications Computer software and applications Computer Software and Applications Conference, 2002. COMPSAC 2002. Proceedings. 26th Annual International. :850-855 2002

Konferenz
73

Mobile code security by Java bytecode instrumentation
Chander, A. ; Mitchell, J.C. ; Shin, I.
Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01 DARPA information survivability DARPA Information Survivability Conference & Exposition II, 2001. DISCEX '01. Proceedings. 2:27-40 vol.2 2001

Konferenz
74

Advanced Java bytecode instrumentation
Binder, Walter ; Hulaas, Jarle ; Moret, Philippe
Proceedings of the 5th international symposium on Principles and practice of programming in Java. :135-144

Konferenz
75

An easy-to-use toolkit for efficient Java bytecode translators
Chiba, Shigeru ; Nishizawa, Muga
Proceedings of the 2nd international conference on Generative programming and component engineering. :364-376

Konferenz
76

Java bytecode to native code translation: the Caffeine prototype and preliminary results
Hsieh, C.-H.A. ; Gyllenhaal, J.C. ; Hwu, W.W.
Proceedings of the 29th Annual IEEE/ACM International Symposium on Microarchitecture. MICRO 29 MICRO-29: microarchitectures Microarchitecture, 1996. MICRO-29.Proceedings of the 29th Annual IEEE/ACM International Symposium on. :90-97 1996

Konferenz
77

Efficient exception handling in Java bytecode-to-c ahead-of-time compiler for smbedded systems
Jung, Dong-Heon ; Park, Jong Kuk ; Bae, Sung-Hwan ; et al.
Proceedings of the 6th ACM & IEEE International conference on Embedded software. :188-194

Konferenz
78

A type system for object initialization in the Java bytecode language
Freund, Stephen N. ; Mitchell, John C.
Proceedings of the 13th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications. :310-327

Konferenz
79

A quantitative analysis of Java bytecode sequences
Stephenson, Ben ; Holst, Wade
Proceedings of the 3rd international symposium on Principles and practice of programming in Java. :15-20

Konferenz
80

Non-Termination Analysis of Java Bytecode
Payet, Étienne ; Mesnard, Fred ; Spoto, Fausto

Computer Science - Progr... F.3.1 F.3.2
Report

Filter