Volltext-Artikel, eBooks und vieles mehr aus dem EBSCO Discovery Service

Das Gesuchte nicht gefunden? Schauen Sie in der Onleihe oder machen Sie einen Kaufvorschlag

Treffer 61 - 80 von 258

61

Modular Termination Proofs of Recursive Java Bytecode Programs by Term Rewriting
Brockschmidt, Marc ; Otto, Carsten ; Giesl, Jürgen ; et al.

termination Java Bytecode term rewriting recursion
Fachzeitschrift
62

Automated Termination Analysis of Java Bytecode by Term Rewriting
Otto, Carsten ; Brockschmidt, Marc ; von Essen, Christian ; et al.

Java Bytecode termination term rewriting
Fachzeitschrift
63

Using CLP Simplifications to Improve Java Bytecode Termination Analysis
Spoto, Fausto ; Lu, Lunjin ; Mesnard, Frédéric ; et al.
Fourth Workshop on Bytecode Semantics, Verification, Analysis and Transformation (BYTECODE 2009) ; https://hal.univ-reunion.fr/hal-01188704 ; Fourth Workshop on Bytecode Semantics, Verification, Analysis and Transformation (BYTECODE 2009), Mar 2009, York, United Kingdom. pp.129--144, ⟨10.1016/j.entcs.2009.11.019⟩

York United Kingdom Java Java bytecode static analysis termination
Konferenz
64

Experiments with Non-Termination Analysis for Java Bytecode
Payet, Etienne ; Spoto, Fausto ; Laboratoire d'Informatique et de Mathématiques (LIM) ; et al.
Fourth Workshop on Bytecode Semantics, Verification, Analysis and Transformation (BYTECODE 2009) ; https://hal.univ-reunion.fr/hal-01188696 ; Fourth Workshop on Bytecode Semantics, Verification, Analysis and Transformation (BYTECODE 2009), Mar 2009, York, United Kingdom. pp.83--96, ⟨10.1016/j.entcs.2009.11.016⟩

York United Kingdom Java Java bytecode static analysis termination
Konferenz
65

Verificación estática de confidencialidad en un sistema de múltiples niveles de seguridad basado en Java bytecode
Medel, Ricardo ; Martínez Spessot, Cesar Ignacio ; Vázquez, Juan C. ; et al.

Ciencias Informáticas nueva tecnología Software Seguridad informática Confidencialidad Sistemas de tipos
Konferenz
66

Decompilation of Java bytecode to Prolog by partial evaluation
Gómez-Zamalloa, Miguel ; Albert, Elvira ; Puebla, Germán
In Information and Software Technology 2009 51(10):1409-1427

Fachzeitschrift
67

A method for detecting the theft of Java programs through analysis of the control flow information
Lim, Hyun-il ; Park, Heewan ; Choi, Seokwoo ; et al.
In Information and Software Technology 2009 51(9):1338-1350

Fachzeitschrift
68

Verification of Java Bytecode using Analysis and Transformation of Logic Programs
Albert, Elvira ; Gómez-Zamalloa, Miguel ; Hubert, Laurent ; et al.
ISSN: 0302-9743 ; Lecture Notes in Computer Science ; The International Symposium on Practical Aspects of Declarative Languages ; https://inria.hal.science/inria-00503986 ; The International Symposium on Practical Aspects of Declarative Languages, 2007, Nice, France. pp.124-139, ⟨10.1007/978-3-540-69611-7_8⟩.

Nice France Java bytecode partial evaluation decompilation logical programming
Konferenz
69

Advanced Mutation Testing of Java Bytecode Using Model Transformation
Bockisch, Christoph ; Dorn, Freya ; Eren, Deniz ; et al.

Mutation testing Java bytecode Model transformation
70

An Efficient, Parametric Fixpoint Algorithm for Analysis of Java Bytecode
Méndez, Mario ; Navas, Jorge ; Hermenegildo, Manuel V.
In Electronic Notes in Theoretical Computer Science 31 July 2007 190(1):51-66

Fachzeitschrift
71

Improving the Decompilation of Java Bytecode to Prolog by Partial Evaluation
Gómez-Zamalloa, Miguel ; Albert, Elvira ; Puebla, Germán
In Electronic Notes in Theoretical Computer Science 31 July 2007 190(1):85-101

Fachzeitschrift
72

Experiments in Cost Analysis of Java Bytecode
Albert, E. ; Arenas, P. ; Genaim, S. ; et al.
In Electronic Notes in Theoretical Computer Science 31 July 2007 190(1):67-83

Fachzeitschrift
73

Formal Translation of Bytecode into BoogiePL
Lehner, Hermann ; Müller, Peter
In Electronic Notes in Theoretical Computer Science 31 July 2007 190(1):35-50

Fachzeitschrift
74

Bytecode Rewriting in Tom
Balland, Emilie ; Moreau, Pierre-Etienne ; Reilles, Antoine
In Electronic Notes in Theoretical Computer Science 31 July 2007 190(1):19-33

Fachzeitschrift
75

Translate One, Analyze Many: Leveraging the Microsoft Intermediate Language and Source Code Transformation for Model Checking
McGeachie, Jesse ; Dingel, Juergen
In Electronic Notes in Theoretical Computer Science 31 July 2007 190(1):3-18

Fachzeitschrift
76

Modular termination proofs of recursive Java Bytecode programs by term rewriting
Marc Brockschmidt ; Carsten Otto ; Jürgen Giesl ; et al.
http://drops.dagstuhl.de/opus/volltexte/2011/3114/pdf/7.pdf.

Java Bytecode term rewriting recursion Digital Object...
Fachzeitschrift
77

The Vulnerability Analysis of Java Bytecode Based on Points-to Dataflow
Tang Hong ; Zhang Lufeng ; Chen Hua ; et al.

Java bytecode points-to dataflow vulnerability analysis
Fachzeitschrift
78

Detecting Common Modules in Java Packages Based on Static Object Trace Birthmark
Heewan Park ; Hyun-il Lim ; Seokwoo Choi ; et al.
http://pllab.kaist.ac.kr/~han/StaticObjectBM.pdf.

software birthmark software theft detection GPL violation Java bytecode analysis
Fachzeitschrift
79

Live Heap Space Analysis for Languages with Garbage Collection
Elvira Albert ; Samir Genaim ; Miguel Gómez-zamalloa ; et al.
http://clip.dia.fi.upm.es/papers/AlbertGG09.pdf.

Low-level Languages Java Bytecode
Fachzeitschrift
80

Experiments in Cost Analysis of Java Bytecode
E. Albert ; P. Arenas ; S. Genaim ; et al.
http://clip.dia.fi.upm.es/papers/jvm-cost-exp-bytecode07.pdf.

Cost analysis Java bytecode cost relations recurrence equations complexity
Fachzeitschrift

Filter