Volltext-Artikel, eBooks und vieles mehr aus dem EBSCO Discovery Service

Das Gesuchte nicht gefunden? Schauen Sie in der Onleihe oder machen Sie einen Kaufvorschlag

Treffer 61 - 80 von 127

61

Preprocesor Java bytecode pro verifikační nástroje ; Java Bytecode Preprocessor for Program Verification Tools
Šafařík, Tomáš ; Parízek, Pavel ; Hnětynka, Petr

Java JVM bytecode transformace kódu verifikace programů code transformation
Dissertation
62

Abstract Verified Bytecode Verifiers
Gerwin Klein ; Tobias Nipkow ; Technische Universität München ; et al.
http://isabelle.in.tum.de/~nipkow/pubs/tcs03.pdf.

Key words Java Bytecode Verification Theorem Proving Data Flow Analysis Object Initialization
Fachzeitschrift
63

A type system for object initialization in the java bytecode language
Stephen N. Freund ; John C. Mitchell ; The Pennsylvania State University CiteSeerX Archives
http://www.stanford.edu/class/cs258/papers/FreundMitchell-Obj.pdf.

General Terms Languages Verification Additional... Bytecode languages Java object initialization
Fachzeitschrift
64

Verified Proof Carrying Code ; Formalisierung und Verifikation eines Systems zum statischen Ausschluss von Sicherheitsfehlern in Bytecode Programmen
Wildmoser, Martin ; Nipkow, Tobias (Prof. Ph.D.) ; Hofmann, Martin (Prof. Ph.D.)

info:eu-repo/classificat... Allgemeines Wissenschaft Verification security safety
Dissertation
66

Instrumentace Java programů, kontrakty pro paralelismus ; Parametric Contracts for Concurrency in Java Programs
Žárský, Jan ; Smrčka, Aleš ; Křena, Bohuslav

verifikace softwaru dynamická analýza Java kontrakty pro paralelism... RoadRunner instrumentace
Dissertation
67

The Functions of Java Bytecode
Mark P. Jones ; The Pennsylvania State University CiteSeerX Archives
http://www-dse.doc.ic.ac.uk/~sue/oopsla/jones.f.ps.

Fachzeitschrift
69

Formal Translation of Bytecode into BoogiePL
Hermann Lehner ; Peter Müller ; The Pennsylvania State University CiteSeerX Archives

Fachzeitschrift
71

Attacks on Java Card 3.0 Combining Fault and Logical Attacks
Guillaume Barbu ; Hugues Thiebeauld ; Vincent Guerin ; et al.
http://hal.archives-ouvertes.fr/docs/00/69/21/65/PDF/CombinedAttackonJC3.pdf.

Key words Java Card 3 Combined Attack Fault Injection Logical Attack
Fachzeitschrift
72
75

Abstract
David Aspinall ; Alberto Momigliano ; The Pennsylvania State University CiteSeerX Archives
http://homepages.inf.ed.ac.uk/da/papers/optval/optval.pdf.

Resource Algebras Lightweight Verification
Fachzeitschrift
76

Abstract
David Aspinall ; Alberto Momigliano ; The Pennsylvania State University CiteSeerX Archives
http://homepages.inf.ed.ac.uk/amomigl1/papers/OptVal.pdf.

Resource Algebras Lightweight Verification
Fachzeitschrift
77

Semantic foundations of intermediate program representations ; Fondements sémantiques des représentations intermédiaires de programmes
Demange, Delphine ; Software certification with semantic analysis (CELTIQUE) ; Inria Rennes – Bretagne Atlantique ; et al.
https://theses.hal.science/tel-00905442 ; Other [cs.OH]. École normale supérieure de Cachan - ENS Cachan, 2012. English. ⟨NNT : 2012DENS0053⟩.

Certified compilation Formal semantics Intermediate representat... Compilation certifiée Sémantique formelle Représentations interméd...
Dissertation
80

Residual Runtime Verification via Reachability Analysis
Falcone, Yliès ; Compiler Optimization and Run-time Systems (CORSE) ; Centre Inria de l'Université Grenoble Alpes ; et al.
VSTTE 2022 - 14th International Conference on Verified Software: Theories, Tools, and Experiments ; https://inria.hal.science/hal-03911820 ; VSTTE 2022 - 14th International Conference on Verified Software: Theories, Tools, and Experiments, Oct 2022, Trento, Italy. pp.1-19

Trento Italy Residual Runtime Verific... Instrumentation Parametric Monitoring Control Flow
Konferenz

Filter