咨询与建议

限定检索结果

文献类型

  • 4 篇 会议
  • 2 篇 期刊文献

馆藏范围

  • 6 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 4 篇 计算机科学与技术...
    • 3 篇 软件工程
    • 1 篇 信息与通信工程
    • 1 篇 网络空间安全
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 6 篇 java byte code
  • 2 篇 java
  • 1 篇 object oriented ...
  • 1 篇 model-based mana...
  • 1 篇 tool-assisted po...
  • 1 篇 distributed syst...
  • 1 篇 event-condition-...
  • 1 篇 resource-constra...
  • 1 篇 theorem proving
  • 1 篇 poly-alphabetic
  • 1 篇 reflection
  • 1 篇 device
  • 1 篇 class
  • 1 篇 management infor...
  • 1 篇 policy
  • 1 篇 class methods
  • 1 篇 computer securit...
  • 1 篇 abstract interpr...
  • 1 篇 mbm approach
  • 1 篇 class loader

机构

  • 1 篇 jiamusi universi...
  • 1 篇 tu dortmund univ...
  • 1 篇 penn state univ ...
  • 1 篇 irisa f-35042 re...
  • 1 篇 swedish inst com...
  • 1 篇 univ pretoria de...
  • 1 篇 materna informat...

作者

  • 1 篇 brooks r
  • 1 篇 fredlund lars-ak...
  • 1 篇 kandemir m
  • 1 篇 pichardie david
  • 1 篇 fiehe christoph
  • 1 篇 jensen thomas
  • 1 篇 engelbrecht rl
  • 1 篇 stewing franz-jo...
  • 1 篇 irwin mj
  • 1 篇 litvina anna
  • 1 篇 chen g
  • 1 篇 besson frederic
  • 1 篇 dohndorf oliver
  • 1 篇 krumm heiko
  • 1 篇 saputra h
  • 1 篇 vijaykrishnan n
  • 1 篇 wang rui
  • 1 篇 kourie dg
  • 1 篇 lück ingo
  • 1 篇 krüger jan

语言

  • 5 篇 英文
  • 1 篇 其他
检索条件"主题词=Java byte code"
6 条 记 录,以下是1-10 订阅
排序:
java byte code File Encryption Research
JAVA Byte Code File Encryption Research
收藏 引用
2011 2ND International Conference on Innovative Computing and Communication and 2011 Asia-Pacific Conference on Information Technology and Ocean Engineering(CICC-ITOE 2011)
作者: Wang Rui Jiamusi University
This paper introduces the java byte code file encryption to protect the relevant technology, the protection of java technology confusing, Class Loader class encryption technology, a detailed study, given the general J... 详细信息
来源: 评论
Proof-carrying code from certified abstract interpretation and fixpoint compression
收藏 引用
THEORETICAL COMPUTER SCIENCE 2006年 第3期364卷 273-291页
作者: Besson, Frederic Jensen, Thomas Pichardie, David Irisa F-35042 Rennes France
Proof-carrying code (PCC) is a technique for downloading mobile code on a host machine while ensuring that the code adheres to the host's safety policy. We show how certified abstract interpretation can be used to... 详细信息
来源: 评论
Issues in translating Smalltalk to java  7th
Issues in translating Smalltalk to Java
收藏 引用
7th International Conference on Compiler Construction (CC 98) at the Joint European Conferences on Theory and Practice of Software (ETAPS 98)
作者: Engelbrecht, RL Kourie, DG Univ Pretoria Dept Comp Sci Object Technol Expertise Ctr ZA-0002 Pretoria South Africa
A number of essential issues in translating Smalltalk to java are addressed. A convention is proposed for mapping Smalltalk method selectors to java method names. In addition, a java class hierarchy that parallels the... 详细信息
来源: 评论
code protection for resource-constrained embedded devices  04
Code protection for resource-constrained embedded devices
收藏 引用
Conference on Languages, Compilers and Tools for Embedded Systems
作者: Saputra, H Chen, G Brooks, R Vijaykrishnan, N Kandemir, M Irwin, MJ Penn State Univ Appl Res Lab University Pk PA 16802 USA
While the machine neutral java bytecodes are attractive for code distribution in the highly heterogeneous embedded domain, the well-documented and standardized features also make it difficult to protect these codes. I... 详细信息
来源: 评论
Policy-based management for resource-constrained devices and systems
Policy-based management for resource-constrained devices and...
收藏 引用
IEEE International Symposium on Policies for Distributed Systems and Networks
作者: Dohndorf, Oliver Krüger, Jan Krumm, Heiko Fiehe, Christoph Litvina, Anna Lück, Ingo Stewing, Franz-Josef TU Dortmund University 44221 Dortmund Germany MATERNA Information and Communications 44141 Dortmund Germany
The presented policy-based management system supports autonomous control and adaptation of a distributed system according to changing conditions and requirements by means of event-condition-action (ECA) rules. Further... 详细信息
来源: 评论
Guaranteeing Correctness Properties of a java Card Applet
收藏 引用
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE 2005年 113卷 217-233页
作者: Fredlund, Lars-Ake Swedish Inst Comp Sci Box 1263 S-16429 Kista Sweden
The paper describes an experiment in which a framework for model checking java byte code, combined with the application of runtime monitoring techniques through code rewriting, was used to guarantee correctness proper... 详细信息
来源: 评论