咨询与建议

限定检索结果

文献类型

  • 43 篇 期刊文献
  • 38 篇 会议
  • 2 篇 学位论文

馆藏范围

  • 83 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 78 篇 工学
    • 69 篇 计算机科学与技术...
    • 43 篇 软件工程
    • 11 篇 电气工程
    • 4 篇 信息与通信工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物医学工程(可授...
  • 3 篇 理学
    • 3 篇 数学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 83 篇 java bytecode
  • 13 篇 static analysis
  • 9 篇 abstract interpr...
  • 8 篇 java
  • 6 篇 decompilation
  • 6 篇 verification
  • 5 篇 termination
  • 5 篇 information flow
  • 4 篇 languages
  • 4 篇 java virtual mac...
  • 4 篇 reverse engineer...
  • 4 篇 theory
  • 4 篇 security
  • 4 篇 low-level langua...
  • 3 篇 instrumentation
  • 3 篇 software piracy
  • 3 篇 embedded systems
  • 3 篇 clone detection
  • 3 篇 program transfor...
  • 3 篇 software protect...

机构

  • 4 篇 univ complutense...
  • 3 篇 philipps univ ma...
  • 3 篇 tech univ madrid...
  • 2 篇 friedrich schill...
  • 2 篇 univ complutense...
  • 2 篇 consejo nacl inv...
  • 2 篇 univ complutense...
  • 2 篇 univ arizona dep...
  • 2 篇 icfai univ fac s...
  • 2 篇 rhein westfal th...
  • 2 篇 tech univ darmst...
  • 2 篇 univ pisa dipart...
  • 2 篇 tech univ madrid...
  • 2 篇 brno university ...
  • 2 篇 hangzhou dianzi ...
  • 2 篇 univ verona i-37...
  • 2 篇 univ verona dipa...
  • 2 篇 cooperat univ ge...
  • 1 篇 queens univ dept...
  • 1 篇 korea adv inst s...

作者

  • 6 篇 gomez-zamalloa m...
  • 6 篇 albert elvira
  • 5 篇 genaim samir
  • 5 篇 spoto fausto
  • 3 篇 puebla german
  • 3 篇 bockisch christo...
  • 2 篇 mueller peter
  • 2 篇 kumar krishan
  • 2 篇 monperrus martin
  • 2 篇 yang jiazha
  • 2 篇 kaur prabhpreet
  • 2 篇 zanardini d.
  • 2 篇 taentzer gabriel...
  • 2 篇 baudry benoit
  • 2 篇 falcone ylies
  • 2 篇 yu dongjin
  • 2 篇 orlov michael
  • 2 篇 otto carsten
  • 2 篇 de francesco nic...
  • 2 篇 neufeld daniel

语言

  • 69 篇 英文
  • 14 篇 其他
检索条件"主题词=Java Bytecode"
83 条 记 录,以下是71-80 订阅
排序:
Live Heap Space Analysis for Languages with Garbage Collection  09
Live Heap Space Analysis for Languages with Garbage Collecti...
收藏 引用
International Conference on Memory Management
作者: Albert, Elvira Genaim, Samir Gomez-Zamalloa, Miguel Univ Complutense Madrid E-28040 Madrid Spain
The peak heap consumption of a program is the maximum size of the live data on the heap during the execution of the program, i.e., the minimum amount of heap space needed to run the program without exhausting the memo... 详细信息
来源: 评论
An approach for analyzing bytecode information flow
An approach for analyzing bytecode information flow
收藏 引用
International Symposium on Communications and Information Technologies (ISCIT2005)
作者: Bian, GW Nakayama, K Kobayashi, Y Maekawa, M Univ Electrocommun Dept Informat Syst Tokyo Japan
Existing approaches are inadequate to address the information flow in java bytecode and the type systems verification often used in these approaches is imprecise. This paper presents a method to disclose java bytecode... 详细信息
来源: 评论
BISM: bytecode-Level Instrumentation for Software Monitoring  20th
BISM: Bytecode-Level Instrumentation for Software Monitoring
收藏 引用
20th International Conference on Runtime Verification (RV)
作者: Soueidi, Chukri Kassem, Ali Falcone, Ylies Univ Grenoble Alpes INRIA CNRS Grenoble INPLIG F-38000 Grenoble France
BISM (bytecode-level Instrumentation for Software Monitoring) is a lightweight java bytecode instrumentation tool which features an expressive high-level control-flow-aware instrumentation language. The language follo... 详细信息
来源: 评论
javaPDG: A New Platform for Program Dependence Analysis
JavaPDG: A New Platform for Program Dependence Analysis
收藏 引用
6th IEEE International Conference on Software Testing, Verification and Validation (ICST)
作者: Shu, Gang Sun, Boya Henderson, Tim A. D. Podgurski, Andy Case Western Reserve Univ Dept Elect Engn & Comp Sci Cleveland OH 44106 USA
Dependence analysis is a fundamental technique for program understanding and is widely used in software testing and debugging. However, there are a limited number of analysis tools available despite a wide range of re... 详细信息
来源: 评论
Using a molecular metaphor to facilitate comprehension of 3D object diagrams
Using a molecular metaphor to facilitate comprehension of 3D...
收藏 引用
IEEE Symposium on Visual Languages and Human-Centric Computing
作者: Malloy, BA Power, JF Clemson Univ Clemson SC 29631 USA
This paper presents a strategy for the visualization of dynamic object relationships in java programs. The metaphor of a chemical molecule is used to aid Comprehension, and to help in reducing the size of the object g... 详细信息
来源: 评论
Software watermarking through register allocation: Implementation, analysis, and attacks
收藏 引用
6th International Conference on Information Security and Cryptology
作者: Myles, G Collberg, C Univ Arizona Dept Comp Sci Tucson AZ 85721 USA
In this paper we explore the application of the QP water-marking algorithm proposed by G. Qu and M. Potkonjak to software watermarking. The algorithm was originally proposed as a technique for watermarking the graph c... 详细信息
来源: 评论
Evolving Software Building Blocks with FINCH  17
Evolving Software Building Blocks with FINCH
收藏 引用
Genetic and Evolutionary Computation Conference (GECCO)
作者: Orlov, Michael Shamoon Coll Engn Beer Sheva Israel
This paper proposes to explore the following question: can software evolution systems like FINCH, that evolve linear representations originating from a higher-level structural language, take advantage of building bloc... 详细信息
来源: 评论
A compositional account of the java virtual machine  99
A compositional account of the Java virtual machine
收藏 引用
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
作者: Phillip M. Yelland Sun Microsystems Laboratories 910 San Antonio Road MS MTV29-117 Palo Alto CA
The java Virtual Machine (or JVM) is central to the system's aim of providing a secure program execution environment that operates identically on a wide variety of computing platforms. To be most effective in this... 详细信息
来源: 评论
AMORTISED RESOURCE ANALYSIS WITH SEPARATION LOGIC
收藏 引用
LOGICAL METHODS IN COMPUTER SCIENCE 2011年 第2期7卷
作者: Atkey, Robert Univ Strathclyde Glasgow G1 1XQ Lanark Scotland
Type-based amortised resource analysis following Hofmann and Jost where resources are associated with individual elements of data structures and doled out to the programmer under a linear typing discipline-have been s... 详细信息
来源: 评论
SECURE THE CLONES
收藏 引用
LOGICAL METHODS IN COMPUTER SCIENCE 2012年 第2期8卷 5-5页
作者: Jensen, Thomas Kirchner, Florent Pichardie, David INRIA Rennes Bretagne Atlantique Bretagne France
Exchanging mutable data objects with untrusted code is a delicate matter because of the risk of creating a data space that is accessible by an attacker. Consequently, secure programming guidelines for java stress the ... 详细信息
来源: 评论