Volltext-Artikel, eBooks und vieles mehr aus dem EBSCO Discovery Service

Das Gesuchte nicht gefunden? Schauen Sie in der Onleihe oder machen Sie einen Kaufvorschlag

Treffer 81 - 100 von 280

81

Compilation Process and Java Bytecode
Malik, Naveen ; Akhtar, Naeem ; Rohilla, Hardeep ; et al.
Journal of Engineering Computers & Applied Sciences; Vol 2, No 10 (2013): Journal of Engineering Computers Applied Sciences; 31-36 ; 2319-5606

Computer Sciences Java Bytecode Compilation process Native code,JIT(Just in... condotions in javabyteco... methods in java bytecode
Fachzeitschrift
82

Modular Termination Proofs of Recursive Java Bytecode Programs by Term Rewriting
Brockschmidt, Marc ; Otto, Carsten ; Giesl, Jürgen ; et al.

termination Java Bytecode term rewriting recursion
Fachzeitschrift
83

Automated Termination Analysis of Java Bytecode by Term Rewriting
Otto, Carsten ; Brockschmidt, Marc ; von Essen, Christian ; et al.

Java Bytecode termination term rewriting
Fachzeitschrift
84

Using CLP Simplifications to Improve Java Bytecode Termination Analysis
Spoto, Fausto ; Lu, Lunjin ; Mesnard, Frédéric ; et al.
Fourth Workshop on Bytecode Semantics, Verification, Analysis and Transformation (BYTECODE 2009) ; https://hal.univ-reunion.fr/hal-01188704 ; Fourth Workshop on Bytecode Semantics, Verification, Analysis and Transformation (BYTECODE 2009), Mar 2009, York, United Kingdom. pp.129--144, ⟨10.1016/j.entcs.2009.11.019⟩

York United Kingdom Java Java bytecode static analysis termination
Konferenz
85

Experiments with Non-Termination Analysis for Java Bytecode
Payet, Etienne ; Spoto, Fausto ; Laboratoire d'Informatique et de Mathématiques (LIM) ; et al.
Fourth Workshop on Bytecode Semantics, Verification, Analysis and Transformation (BYTECODE 2009) ; https://hal.univ-reunion.fr/hal-01188696 ; Fourth Workshop on Bytecode Semantics, Verification, Analysis and Transformation (BYTECODE 2009), Mar 2009, York, United Kingdom. pp.83--96, ⟨10.1016/j.entcs.2009.11.016⟩

York United Kingdom Java Java bytecode static analysis termination
Konferenz
86

Verificación estática de confidencialidad en un sistema de múltiples niveles de seguridad basado en Java bytecode
Medel, Ricardo ; Martínez Spessot, Cesar Ignacio ; Vázquez, Juan C. ; et al.

Ciencias Informáticas nueva tecnología Software Seguridad informática Confidencialidad Sistemas de tipos
Konferenz
87

Decompilation of Java bytecode to Prolog by partial evaluation
Gómez-Zamalloa, Miguel ; Albert, Elvira ; Puebla, Germán
In Information and Software Technology 2009 51(10):1409-1427

Fachzeitschrift
88

A method for detecting the theft of Java programs through analysis of the control flow information
Lim, Hyun-il ; Park, Heewan ; Choi, Seokwoo ; et al.
In Information and Software Technology 2009 51(9):1338-1350

Fachzeitschrift
89

Verification of Java Bytecode using Analysis and Transformation of Logic Programs
Albert, Elvira ; Gómez-Zamalloa, Miguel ; Hubert, Laurent ; et al.
ISSN: 0302-9743 ; Lecture Notes in Computer Science ; The International Symposium on Practical Aspects of Declarative Languages ; https://inria.hal.science/inria-00503986 ; The International Symposium on Practical Aspects of Declarative Languages, 2007, Nice, France. pp.124-139, ⟨10.1007/978-3-540-69611-7_8⟩.

Nice France Java bytecode partial evaluation decompilation logical programming
Konferenz
90

Advanced Mutation Testing of Java Bytecode Using Model Transformation
Bockisch, Christoph ; Dorn, Freya ; Eren, Deniz ; et al.

Mutation testing Java bytecode Model transformation
91

An Efficient, Parametric Fixpoint Algorithm for Analysis of Java Bytecode
Méndez, Mario ; Navas, Jorge ; Hermenegildo, Manuel V.
In Electronic Notes in Theoretical Computer Science 31 July 2007 190(1):51-66

Fachzeitschrift
92

Improving the Decompilation of Java Bytecode to Prolog by Partial Evaluation
Gómez-Zamalloa, Miguel ; Albert, Elvira ; Puebla, Germán
In Electronic Notes in Theoretical Computer Science 31 July 2007 190(1):85-101

Fachzeitschrift
93

Experiments in Cost Analysis of Java Bytecode
Albert, E. ; Arenas, P. ; Genaim, S. ; et al.
In Electronic Notes in Theoretical Computer Science 31 July 2007 190(1):67-83

Fachzeitschrift
94

Formal Translation of Bytecode into BoogiePL
Lehner, Hermann ; Müller, Peter
In Electronic Notes in Theoretical Computer Science 31 July 2007 190(1):35-50

Fachzeitschrift
95

Bytecode Rewriting in Tom
Balland, Emilie ; Moreau, Pierre-Etienne ; Reilles, Antoine
In Electronic Notes in Theoretical Computer Science 31 July 2007 190(1):19-33

Fachzeitschrift
96

Translate One, Analyze Many: Leveraging the Microsoft Intermediate Language and Source Code Transformation for Model Checking
McGeachie, Jesse ; Dingel, Juergen
In Electronic Notes in Theoretical Computer Science 31 July 2007 190(1):3-18

Fachzeitschrift
97

Modular termination proofs of recursive Java Bytecode programs by term rewriting
Marc Brockschmidt ; Carsten Otto ; Jürgen Giesl ; et al.
http://drops.dagstuhl.de/opus/volltexte/2011/3114/pdf/7.pdf.

Java Bytecode term rewriting recursion Digital Object...
Fachzeitschrift
98

The Vulnerability Analysis of Java Bytecode Based on Points-to Dataflow
Tang Hong ; Zhang Lufeng ; Chen Hua ; et al.

Java bytecode points-to dataflow vulnerability analysis
Fachzeitschrift
99

Detecting Common Modules in Java Packages Based on Static Object Trace Birthmark
Heewan Park ; Hyun-il Lim ; Seokwoo Choi ; et al.
http://pllab.kaist.ac.kr/~han/StaticObjectBM.pdf.

software birthmark software theft detection GPL violation Java bytecode analysis
Fachzeitschrift
100

Live Heap Space Analysis for Languages with Garbage Collection
Elvira Albert ; Samir Genaim ; Miguel Gómez-zamalloa ; et al.
http://clip.dia.fi.upm.es/papers/AlbertGG09.pdf.

Low-level Languages Java Bytecode
Fachzeitschrift

Filter