Volltext-Artikel, eBooks und vieles mehr aus dem EBSCO Discovery Service

Das Gesuchte nicht gefunden? Schauen Sie in der Onleihe oder machen Sie einen Kaufvorschlag

Treffer 21 - 40 von 84

21

A type system for JVM threads
Laneve, Cosimo
In Theoretical Computer Science 2003 290(1):741-778

Fachzeitschrift
22

Weaknesses in Java bytecode verifier
In Network Security 1996 1996(4):2-2

News
23

On the implementation of a stand-alone Java/sup TM/ bytecode verifier
Painchaud, F. ; Debbabi, M.
Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000) Enabling technologies: infrastructure for collaborative enterprise Enabling Technologies: Infrastructure for Collaborative Enterprises, 2000. (WET ICE 2000). Proeedings. IEEE 9th International Workshops on. :189-194 2000

Konferenz
24

Lightweight Bytecode Verification.
Eva Rose
Journal of Automated Reasoning; Sep2003, Vol. 31 Issue 3/4, p303-334, 32p

DATA protection EMBEDDED computer system... MOBILE communication sys... MANIPULATIVE behavior
Fachzeitschrift
25

Java Bytecode Verification is not possible (Extended Abstract
Robert F. Stärk ; Joachim Schmid ; The Pennsylvania State University CiteSeerX Archives
http://www.tydo.de/files/papers/javaBytecode.pdf.

Fachzeitschrift
27

A Type System for JVM Threads
Cosimo Laneve ; The Pennsylvania State University CiteSeerX Archives
http://www.cs.unibo.it/~laneve/papers/fulljvmc.ps.

Fachzeitschrift
28

Java Bytecode Verification is Not Possible
Robert F. Stärk ; Joachim Schmid ; The Pennsylvania State University CiteSeerX Archives
http://www.inf.ethz.ch/~staerk/pdf/jbv00.pdf.

Fachzeitschrift
29

Adding type parameterization to the Java language
Agesen, Ole ; Freund, Stephen N. ; Mitchell, John C.
Proceedings of the 12th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications. :49-65

Konferenz
31

Java Access Protection through Typing
Eva Rose ; Kristoffer Hgsbro Rose ; The Pennsylvania State University CiteSeerX Archives
http://www.ens-lyon.fr/~krisrose/ftp/PAPERS/roses-ftfjp2000.ps.gz.

Fachzeitschrift
33

Lightweight Bytecode Verification
Eva Rose ; The Pennsylvania State University CiteSeerX Archives
http://evarose.net:800/~evarose/rose-jar-pcc.pdf.

Fachzeitschrift
35

Efficient Bytecode Verification using Immediate Postdominators in Control Flow Graphs
BERNARDESCHI, CINZIA ; DE FRANCESCO, NICOLETTA ; MARTINI L. ; et al.

Konferenz
36

Tools and algorithms for the construction and analysis of systems: 5th international conference, TACAS'99, held as part of the Joint European Conferences on Theory and Practice of Software, ETAPS'99, Amsterdam, The Netherlands, March 22-28, 1999 : proceedings
Cleaveland, W. R. (Walter Rance), 1961- ; European Conferences on Theory and Practice of Software (1999 : Amsterdam, Netherlands)

System design -- Congres... Computer software -- Dev... Computer science. Computer networks. Software engineering. Logic design.
Buch
37

Composability, Provability, Reusability (CPR) for Survivability
Goldberg, Allen ; KESTREL INST PALO ALTO CA
DTIC AND NTIS

Computer Programming and... SURVIVABILITY VIRTUAL REALITY JAVA PROGRAMMING LANGUAG... DIGITAL SYSTEMS DATA PROCESSING SECURITY
Fachzeitschrift
38

A programming logic for Java bytecode programs
Quigley, Claire Louise

005.45 QA75 Electronic computer...
Dissertation

Filter