Volltext-Artikel, eBooks und vieles mehr aus dem EBSCO Discovery Service

Das Gesuchte nicht gefunden? Schauen Sie in der Onleihe oder machen Sie einen Kaufvorschlag

Treffer 1 - 20 von 280

1

Levels of Binary Equivalence for the Comparison of Binaries from Alternative Builds
Dietrich, Jens ; White, Tim ; Hassanshahi, Behnaz ; et al.
2025 IEEE International Conference on Software Maintenance and Evolution (ICSME) ICSME Software Maintenance and Evolution (ICSME), 2025 IEEE International Conference on. :576-587 Sep, 2025

Konferenz
2

MiniLib: A flow analysis–based approach for attack surface reduction through software debloating
Kopanias, Loukas ; Sotiropoulos, Panagiotis ; Kolokotronis, Nicholas ; et al.
2025 IEEE International Conference on Cyber Security and Resilience (CSR) Cyber Security and Resilience (CSR), 2025 IEEE International Conference on. :260-266 Aug, 2025

Konferenz
3

Mutation Testing of Java Bytecode: A Model-Driven Approach
Bockisch, Christoph ; Eren, Deniz ; Lehmann, Sascha ; et al.
Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems. :237-248

Konferenz
4

Abstract Interpretation of Java Bytecode in Sturdy
Marx, Stefan ; Erdweg, Sebastian
Proceedings of the 26th ACM International Workshop on Formal Techniques for Java-like Programs. :17-22

Konferenz
5

StoneDetector: Structural and Sub-Clone Detection
Schafer, Andre ; Amme, Wolfram ; Heinze, Thomas S.
2023 IEEE 17th International Workshop on Software Clones (IWSC) IWSC Software Clones (IWSC), 2023 IEEE 17th International Workshop on. :33-36 Oct, 2023

Konferenz
6

Finding Source Code Clones in Intermediate Representations of Java Bytecode
Schafer, Andre ; Heinze, Thomas S. ; Amme, Wolfram
2023 IEEE 17th International Workshop on Software Clones (IWSC) IWSC Software Clones (IWSC), 2023 IEEE 17th International Workshop on. :37-43 Oct, 2023

Konferenz
7

Capturing program models with BISM
Soueidi, Chukri ; Falcone, Yliès
Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing. :1857-1861

Konferenz
8

Constraint-logic object-oriented programming on the Java virtual machine
Winkelmann, Hendrik ; Kuchen, Herbert
Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing. :1258-1267

Konferenz
9

Performance Study of Kotlin and Java Program Considering Bytecode Instructions and JVM JIT Compiler
Sonoyama, Atsuya ; Kamiyama, Takeshi ; Oguchi, Masato ; et al.
2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW) CANDARW Computing and Networking Workshops (CANDARW), 2021 Ninth International Symposium on. :127-133 Nov, 2021

Konferenz
10

LibCapsule: Complete Confinement of Third-Party Libraries in Android Applications
Qiu, J. ; Yang, X. ; Wu, H. ; et al.
IEEE Transactions on Dependable and Secure Computing IEEE Trans. Dependable and Secure Comput. Dependable and Secure Computing, IEEE Transactions on. 19(5):2873-2889 Jan, 2022

Fachzeitschrift
11

Observation of Method Invocation in Application Runtime in Android for CPU Clock Rate Adjustment
Kumakura, Kota ; Sonoyama, Atsuya ; Kamiyama, Takeshi ; et al.
2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW) CANDARW Computing and Networking Workshops (CANDARW), 2021 Ninth International Symposium on. :481-483 Nov, 2021

Konferenz
12

JShrink: in-depth investigation into debloating modern Java applications
Bruce, Bobby R. ; Zhang, Tianyi ; Arora, Jaspreet ; et al.
Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. :135-146

Konferenz
13

WebJShrink: a web service for debloating Java bytecode
Macias, Konner ; Mathur, Mihir ; Bruce, Bobby R. ; et al.
Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. :1665-1669

Konferenz
14

TACAI: an intermediate representation based on abstract interpretation
Reif, Michael ; Kübler, Florian ; Helm, Dominik ; et al.
Proceedings of the 9th ACM SIGPLAN International Workshop on the State Of the Art in Program Analysis. :2-7

Konferenz
15

The Strengths and Behavioral Quirks of Java Bytecode Decompilers
Harrand, Nicolas ; Soto-Valero, Cesar ; Monperrus, Martin ; et al.
2019 19th International Working Conference on Source Code Analysis and Manipulation (SCAM) SCAM Source Code Analysis and Manipulation (SCAM), 2019 19th International Working Conference on. :92-102 Sep, 2019

Konferenz
16

Constraint Based Testing and Verification of Java Bytecode Programs
Achour, Safaa ; Benattou, Mohammzed
2018 IEEE 5th International Congress on Information Science and Technology (CiSt) Information Science and Technology (CiSt), 2018 IEEE 5th International Congress on. :64-69 Oct, 2018

Konferenz
17

Vulnerabilities Constraint Based Analysis Approach for Java Bytecode Programs
Achour, Safaa ; Benattou, Mohammed
2018 6th International Conference on Multimedia Computing and Systems (ICMCS) Multimedia Computing and Systems (ICMCS), 2018 6th International Conference on. :1-6 May, 2018

Konferenz
18

Dynamic symbolic execution of Java programs using JNI
Vartanov, Sergey
2017 Computer Science and Information Technologies (CSIT) Computer Science and Information Technologies (CSIT), 2017. :83-86 Sep, 2017

Konferenz
19

Detecting Java Code Clones with Multi-granularities Based on Bytecode
Yu, Dongjin ; Wang, Jie ; Wu, Qing ; et al.
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) COMPSAC Computer Software and Applications Conference (COMPSAC), 2017 IEEE 41st Annual. 1:317-326 Jul, 2017

Konferenz
20

Detecting Java Code Clones Based on Bytecode Sequence Alignment
Yu, D. ; Yang, J. ; Chen, X. ; et al.
IEEE Access Access, IEEE. 7:22421-22433 2019

Fachzeitschrift

Filter