咨询与建议

限定检索结果

文献类型

  • 138 篇 会议
  • 124 篇 期刊文献
  • 10 篇 学位论文
  • 1 篇 资讯

馆藏范围

  • 273 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 241 篇 工学
    • 185 篇 计算机科学与技术...
    • 137 篇 软件工程
    • 43 篇 电气工程
    • 21 篇 信息与通信工程
    • 5 篇 电子科学与技术(可...
    • 5 篇 控制科学与工程
    • 3 篇 化学工程与技术
    • 3 篇 生物工程
    • 3 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 仪器科学与技术
    • 1 篇 土木工程
    • 1 篇 测绘科学与技术
    • 1 篇 公安技术
  • 15 篇 理学
    • 5 篇 化学
    • 4 篇 数学
    • 3 篇 生物学
    • 2 篇 物理学
    • 2 篇 大气科学
  • 5 篇 医学
    • 2 篇 临床医学
    • 1 篇 特种医学
    • 1 篇 医学技术(可授医学...
  • 5 篇 管理学
    • 5 篇 管理科学与工程(可...
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 273 篇 java virtual mac...
  • 29 篇 java
  • 24 篇 garbage collecti...
  • 22 篇 performance
  • 22 篇 languages
  • 18 篇 memory managemen...
  • 12 篇 experimentation
  • 12 篇 profiling
  • 11 篇 embedded systems
  • 11 篇 just-in-time com...
  • 11 篇 bytecode instrum...
  • 10 篇 real-time system...
  • 9 篇 object-oriented ...
  • 8 篇 algorithms
  • 6 篇 bytecode
  • 6 篇 java processor
  • 6 篇 dynamic memory m...
  • 6 篇 optimization
  • 6 篇 ownership types
  • 6 篇 performance anal...

机构

  • 7 篇 univ svizzera it...
  • 6 篇 purdue univ dept...
  • 5 篇 seoul natl univ ...
  • 5 篇 univ lugano fac ...
  • 4 篇 ecole polytech f...
  • 4 篇 univ regina dept...
  • 4 篇 brno university ...
  • 3 篇 univ lugano luga...
  • 3 篇 seoul natl univ
  • 3 篇 seoul natl univ ...
  • 3 篇 shanghai jiao to...
  • 3 篇 tianjin univ col...
  • 3 篇 ecole polytech f...
  • 3 篇 univ victoria de...
  • 3 篇 coll william & m...
  • 2 篇 tu eindhoven ein...
  • 2 篇 natl res univ hi...
  • 2 篇 univ texas dept ...
  • 2 篇 univ calif irvin...
  • 2 篇 shanghai ai lab ...

作者

  • 28 篇 binder walter
  • 15 篇 rosa andrea
  • 10 篇 ansaloni danilo
  • 10 篇 moret philippe
  • 9 篇 moon soo-mook
  • 9 篇 villazon alex
  • 8 篇 rosales eduardo
  • 8 篇 vitek jan
  • 7 篇 wu mingyu
  • 6 篇 guerraoui rachid
  • 5 篇 chen haibo
  • 5 篇 basso matteo
  • 4 篇 lo ctd
  • 4 篇 franz michael
  • 4 篇 lee jaemok
  • 4 篇 zang binyu
  • 4 篇 spring jesper ho...
  • 4 篇 srisa-an w
  • 4 篇 zhang wei
  • 3 篇 zheng yudi

语言

  • 251 篇 英文
  • 21 篇 其他
  • 1 篇 中文
检索条件"主题词=Java Virtual Machine"
273 条 记 录,以下是101-110 订阅
排序:
Polymorphic bytecode instrumentation
收藏 引用
SOFTWARE-PRACTICE & EXPERIENCE 2016年 第10期46卷 1351-1380页
作者: Binder, Walter Moret, Philippe Tanter, Eric Ansaloni, Danilo USI Fac Informat Via G Buffi 13 CH-6900 Lugano Switzerland Univ Chile Comp Sci Dept DCC PLEIAD Lab Santiago Chile
Bytecode instrumentation is a widely used technique to implement aspect weaving and dynamic analyses in virtual machines such as the java virtual machine. Aspect weavers and other instrumentations are usually develope... 详细信息
来源: 评论
Design, implementation, and evaluation of a compilation server
收藏 引用
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS 2007年 第4期29卷 1.1-1.40页
作者: Lee, Han B. Diwan, Amer Moss, J. Eliot B. Univ Colorado Boulder CO 80309 USA Univ Massachusetts Amherst MA 01003 USA
Modern JVM implementations interleave execution with compilation of '' hot '' methods to achieve reasonable performance. Since compilation overhead impacts the execution time of the application and ind... 详细信息
来源: 评论
Efficient Reuse of Local Regions in Memory-limited Mobile Devices
收藏 引用
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS 2010年 第3期56卷 1297-1303页
作者: Kim, Seonggun Kim, Taein Im, Eul Gyu Han, Hwansoo Sungkyunkwan Univ Dept Comp Engn Seoul South Korea Korea Adv Inst Sci & Technol Dept Comp Sci Taejon South Korea Hanyang Univ Dept Comp Sci & Engn Seoul South Korea
Many researches aim to improve memory management for performance, efficiency, ease of use, and safety. Region-based memory management, a newly investigated technique for memory-limited mobile devices, splits the heap ... 详细信息
来源: 评论
Space-and-Time Efficient Parallel Garbage Collector for Data-Intensive Applications
收藏 引用
INTERNATIONAL JOURNAL OF PARALLEL PROGRAMMING 2011年 第4期39卷 451-472页
作者: Liu, Shaoshan Wang, Ligang Li, Xiao-Feng Gaudiot, Jean-Luc Univ Calif Irvine Irvine CA 92717 USA Intel China Res Ctr Beijing Peoples R China
As multithreaded server applications and runtime systems prevail, garbage collection is becoming an essential feature to support high performance systems, especially those running data-intensive applications. The fund... 详细信息
来源: 评论
Reasoning about safety properties in a JVM-like environment
收藏 引用
SCIENCE OF COMPUTER PROGRAMMING 2007年 第2-3期67卷 278-300页
作者: Fong, Philip W. L. Univ Regina Dept Comp Sci Regina SK S4S 0A2 Canada
Type-based protection mechanisms in a JVM-like environment must be administrated by the code consumer at the bytecode level. Unfortunately, formulating a sound static type system for the full JVM bytecode language can... 详细信息
来源: 评论
Compiling lazy functional programs to java bytecode
收藏 引用
SOFTWARE-PRACTICE & EXPERIENCE 1999年 第7期29卷 617-645页
作者: Meehan, G Joy, M Univ Warwick Dept Comp Sci Coventry CV4 7AL W Midlands England
The java virtual machine (JVM) was designed as the target for java compilers, but there is no reason why it cannot be used as the target for other languages. We describe the implementation of a compiler which translat... 详细信息
来源: 评论
Flexible and efficient profiling with aspect-oriented programming
收藏 引用
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE 2011年 第15期23卷 1749-1773页
作者: Binder, Walter Ansaloni, Danilo Villazon, Alex Moret, Philippe Univ Lugano Fac Informat CH-6900 Lugano Switzerland UPB CINTI Cochabamba Bolivia
Many profilers for virtual execution environments, such as the java virtual machine (JVM), are implemented with low-level bytecode instrumentation techniques, which is tedious, error-prone, and complicates maintenance... 详细信息
来源: 评论
The transient combinator, higher-order strategies, and the distributed data problem
收藏 引用
SCIENCE OF COMPUTER PROGRAMMING 2004年 第1-3期52卷 165-212页
作者: Winter, VL Subramaniam, M Univ Nebraska Dept Comp Sci Omaha NE 68182 USA
The distributed data problem is characterized by the desire to bring together semantically related data from syntactically unrelated portions of a term. A strategic combinator called transient and a strategic constant... 详细信息
来源: 评论
Application- and Transaction Isolation under java
收藏 引用
COMPUTER SCIENCE-RESEARCH AND DEVELOPMENT 2008年 第2期22卷 59-69页
作者: Mueller, Jens Spruth, Wilhelm G. Univ Tubingen Wilhelm Schickard Inst Informat Arbeitsbereich Tech Informat Sand 13 D-72076 Tubingen Germany Univ Leipzig Inst Informat Abt Computersysteme D-04103 Leipzig Germany
The java Platform, Enterprise Edition (java EE, previous term: J2EE) has been designed to permit the use of java for mission critical transactional business applications such as financial accounting or enterprise reso... 详细信息
来源: 评论
JVM Bytecode Verification Without Dataflow Analysis
收藏 引用
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE 2005年 第1期141卷 203-220页
作者: Bayley, Ian Shiel, Sam Oxford Brookes Univ Dept Comp Oxford OX33 1HX England
Bytecode verification algorithms are traditionally based on dataflow analysis. We present an alternative algorithm that first restructures the bytecode and then infers a type signature for each method in a manner typi... 详细信息
来源: 评论