咨询与建议

限定检索结果

文献类型

  • 43 篇 期刊文献
  • 38 篇 会议

馆藏范围

  • 81 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 78 篇 工学
    • 69 篇 计算机科学与技术...
    • 43 篇 软件工程
    • 11 篇 电气工程
    • 4 篇 信息与通信工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物医学工程(可授...
  • 3 篇 理学
    • 3 篇 数学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 81 篇 java bytecode
  • 13 篇 static analysis
  • 9 篇 abstract interpr...
  • 7 篇 java
  • 6 篇 decompilation
  • 6 篇 verification
  • 5 篇 termination
  • 5 篇 information flow
  • 4 篇 languages
  • 4 篇 reverse engineer...
  • 4 篇 theory
  • 4 篇 security
  • 4 篇 low-level langua...
  • 3 篇 instrumentation
  • 3 篇 java virtual mac...
  • 3 篇 software piracy
  • 3 篇 embedded systems
  • 3 篇 clone detection
  • 3 篇 program transfor...
  • 3 篇 software protect...

机构

  • 4 篇 univ complutense...
  • 3 篇 philipps univ ma...
  • 3 篇 tech univ madrid...
  • 2 篇 friedrich schill...
  • 2 篇 univ complutense...
  • 2 篇 consejo nacl inv...
  • 2 篇 univ complutense...
  • 2 篇 univ arizona dep...
  • 2 篇 icfai univ fac s...
  • 2 篇 rhein westfal th...
  • 2 篇 tech univ darmst...
  • 2 篇 univ pisa dipart...
  • 2 篇 tech univ madrid...
  • 2 篇 hangzhou dianzi ...
  • 2 篇 univ verona i-37...
  • 2 篇 univ verona dipa...
  • 2 篇 cooperat univ ge...
  • 1 篇 queens univ dept...
  • 1 篇 korea adv inst s...
  • 1 篇 univ fed goias i...

作者

  • 6 篇 gomez-zamalloa m...
  • 6 篇 albert elvira
  • 5 篇 genaim samir
  • 5 篇 spoto fausto
  • 3 篇 puebla german
  • 3 篇 bockisch christo...
  • 2 篇 mueller peter
  • 2 篇 kumar krishan
  • 2 篇 monperrus martin
  • 2 篇 yang jiazha
  • 2 篇 kaur prabhpreet
  • 2 篇 zanardini d.
  • 2 篇 taentzer gabriel...
  • 2 篇 baudry benoit
  • 2 篇 falcone ylies
  • 2 篇 yu dongjin
  • 2 篇 orlov michael
  • 2 篇 otto carsten
  • 2 篇 de francesco nic...
  • 2 篇 neufeld daniel

语言

  • 67 篇 英文
  • 14 篇 其他
检索条件"主题词=Java Bytecode"
81 条 记 录,以下是21-30 订阅
排序:
java decompiler diversity and its application to meta-decompilation
收藏 引用
JOURNAL OF SYSTEMS AND SOFTWARE 2020年 168卷 110645-110645页
作者: Harrand, Nicolas Soto-Valero, Cesar Monperrus, Martin Baudry, Benoit KTH Royal Inst Technol SE-10044 Stockholm Sweden
During compilation from java source code to bytecode, some information is irreversibly lost. In other words, compilation and decompilation of java code is not symmetric. Consequently, decompilation, which aims at prod... 详细信息
来源: 评论
JShrink: In-Depth Investigation into Debloating Modern java Applications  2020
JShrink: In-Depth Investigation into Debloating Modern Java ...
收藏 引用
28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE)
作者: Bruce, Bobby R. Zhang, Tianyi Arora, Jaspreet Xu, Guoqing Harry Kim, Miryung Univ Calif Davis Davis CA 95616 USA Harvard Univ Cambridge MA 02138 USA Univ Calif Los Angeles Los Angeles CA 90024 USA
Modern software is bloated. Demand for new functionality has led developers to include more and more features, many of which become unneeded or unused as software evolves. This phenomenon, known as software bloat, res... 详细信息
来源: 评论
BISM: bytecode-Level Instrumentation for Software Monitoring  20th
BISM: Bytecode-Level Instrumentation for Software Monitoring
收藏 引用
20th International Conference on Runtime Verification (RV)
作者: Soueidi, Chukri Kassem, Ali Falcone, Ylies Univ Grenoble Alpes INRIA CNRS Grenoble INPLIG F-38000 Grenoble France
BISM (bytecode-level Instrumentation for Software Monitoring) is a lightweight java bytecode instrumentation tool which features an expressive high-level control-flow-aware instrumentation language. The language follo... 详细信息
来源: 评论
Detecting java Code Clones with Multi-Granularities Based on bytecode  41
Detecting Java Code Clones with Multi-Granularities Based on...
收藏 引用
41st IEEE Annual Computer Software and Applications Conference (COMPSAC)
作者: Yu, Dongjin Wang, Jie Wu, Qing Yang, Jiazha Wang, Jiaojiao Yang, Wei Yan, Wei Hangzhou Dianzi Univ Sch Comp Sci & Technol Hangzhou Zhejiang Peoples R China Zhejiang Topcheer Informat Technol Co Ltd Zhejiang Inst Comp Technol Hangzhou Zhejiang Peoples R China Zhejiang Inst Sci & Technol Informat Hangzhou Zhejiang Peoples R China
Sequences of duplicate code, either with or without modification, are known as code clones or just clones. Code clones are generally considered undesirable for a number of reasons, although they can offer some conveni... 详细信息
来源: 评论
java bytecode to Hardware Made Easy with Bluespec SystemVerilog  12
Java Bytecode to Hardware Made Easy with Bluespec SystemVeri...
收藏 引用
10th International Workshop on java Technologies for Real-Time and Embedded Systems (JTRES)
作者: Gruian, Flavius Arslan, Mehmet Ali Lund Univ Dept Comp Sci S-22100 Lund Sweden
This paper presents a method for translation of java byte-code sequences into synthesizable hardware, using the Bluespec SystemVerilog (BSV) environment. At the core of our approach lies a BSV description of a subset ... 详细信息
来源: 评论
Negative Effects of bytecode Instrumentation on java Source Code Coverage  23
Negative Effects of Bytecode Instrumentation on Java Source ...
收藏 引用
23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER)
作者: Tengeri, David Horvath, Ferenc Beszedes, Arpad Gergely, Tamas Gyimothy, Tibor Univ Szeged Dept Software Engn Szeged Hungary
Code coverage measurement is an important element in white-box testing, both in industrial practice and academic research. Other related areas are highly dependent on code coverage as well, including test case generat... 详细信息
来源: 评论
Evolving Software Building Blocks with FINCH  17
Evolving Software Building Blocks with FINCH
收藏 引用
Genetic and Evolutionary Computation Conference (GECCO)
作者: Orlov, Michael Shamoon Coll Engn Beer Sheva Israel
This paper proposes to explore the following question: can software evolution systems like FINCH, that evolve linear representations originating from a higher-level structural language, take advantage of building bloc... 详细信息
来源: 评论
Modular Termination Proofs of Recursive java bytecode Programs by Term Rewriting
Modular Termination Proofs of Recursive Java Bytecode Progra...
收藏 引用
22nd International Conference on Rewriting Techniques and Applications(RTA) held as part of Federated Conference on Rewriting, Deduction, and Programming (RDP)
作者: Brockschmidt, Marc Otto, Carsten Giesl, Juergen Rhein Westfal TH Aachen LuFG Informat 2 Aachen Germany
In [5, 15] we presented an approach to prove termination of non-recursive java bytecode (JBC) programs automatically. Here, JBC programs are first transformed to finite termination graphs which represent all possible ... 详细信息
来源: 评论
Verifying pointer programs using graph grammars
收藏 引用
SCIENCE OF COMPUTER PROGRAMMING 2015年 第Part1期97卷 157-162页
作者: Heinen, Jonathan Jansen, Christina Katoen, Joost-Pieter Noll, Thomas Rhein Westfal TH Aachen Software Modeling & Verificat Grp Aachen Germany
This paper argues that graph grammars naturally model dynamic data structures such as lists, trees and combinations thereof. These grammars can be exploited to obtain finite abstractions of pointer-manipulating progra... 详细信息
来源: 评论
A Termination Analyzer for java bytecode Based on Path-Length
收藏 引用
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS 2010年 第3期32卷 8-8.70页
作者: Spoto, Fausto Mesnard, Fred Payet, Etienne Univ Verona Dipartimento Informat I-37134 Verona Italy Univ Reunion LIM IREMIA F-97715 St Denis Messag 9 France
It is important to prove that supposedly terminating programs actually terminate, particularly if those programs must be run on critical systems or downloaded into a client such as a mobile phone. Although termination... 详细信息
来源: 评论