咨询与建议

限定检索结果

文献类型

  • 43 篇 期刊文献
  • 38 篇 会议
  • 2 篇 学位论文

馆藏范围

  • 83 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 78 篇 工学
    • 69 篇 计算机科学与技术...
    • 43 篇 软件工程
    • 11 篇 电气工程
    • 4 篇 信息与通信工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物医学工程(可授...
  • 3 篇 理学
    • 3 篇 数学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 83 篇 java bytecode
  • 13 篇 static analysis
  • 9 篇 abstract interpr...
  • 8 篇 java
  • 6 篇 decompilation
  • 6 篇 verification
  • 5 篇 termination
  • 5 篇 information flow
  • 4 篇 languages
  • 4 篇 java virtual mac...
  • 4 篇 reverse engineer...
  • 4 篇 theory
  • 4 篇 security
  • 4 篇 low-level langua...
  • 3 篇 instrumentation
  • 3 篇 software piracy
  • 3 篇 embedded systems
  • 3 篇 clone detection
  • 3 篇 program transfor...
  • 3 篇 software protect...

机构

  • 4 篇 univ complutense...
  • 3 篇 philipps univ ma...
  • 3 篇 tech univ madrid...
  • 2 篇 friedrich schill...
  • 2 篇 univ complutense...
  • 2 篇 consejo nacl inv...
  • 2 篇 univ complutense...
  • 2 篇 univ arizona dep...
  • 2 篇 icfai univ fac s...
  • 2 篇 rhein westfal th...
  • 2 篇 tech univ darmst...
  • 2 篇 univ pisa dipart...
  • 2 篇 tech univ madrid...
  • 2 篇 brno university ...
  • 2 篇 hangzhou dianzi ...
  • 2 篇 univ verona i-37...
  • 2 篇 univ verona dipa...
  • 2 篇 cooperat univ ge...
  • 1 篇 queens univ dept...
  • 1 篇 korea adv inst s...

作者

  • 6 篇 gomez-zamalloa m...
  • 6 篇 albert elvira
  • 5 篇 genaim samir
  • 5 篇 spoto fausto
  • 3 篇 puebla german
  • 3 篇 bockisch christo...
  • 2 篇 mueller peter
  • 2 篇 kumar krishan
  • 2 篇 monperrus martin
  • 2 篇 yang jiazha
  • 2 篇 kaur prabhpreet
  • 2 篇 zanardini d.
  • 2 篇 taentzer gabriel...
  • 2 篇 baudry benoit
  • 2 篇 falcone ylies
  • 2 篇 yu dongjin
  • 2 篇 orlov michael
  • 2 篇 otto carsten
  • 2 篇 de francesco nic...
  • 2 篇 neufeld daniel

语言

  • 69 篇 英文
  • 14 篇 其他
检索条件"主题词=Java bytecode"
83 条 记 录,以下是21-30 订阅
排序:
Finding Source Code Clones in Intermediate Representations of java bytecode  17
Finding Source Code Clones in Intermediate Representations o...
收藏 引用
IEEE 17th International Workshop on Software Clones (IWSC)
作者: Schaefer, Andre Heinze, Thomas S. Amme, Wolfram Friedrich Schiller Univ Jena Jena Germany Cooperat Univ Gera Eisenach Gera Germany
Copied, reused and modified program code is a common phenomena in software development. As the resulting code clones are often not labeled as such and their proper detection is crucial to software quality and re-engin... 详细信息
来源: 评论
The Strengths and Behavioral Quirks of java bytecode Decompilers  19
The Strengths and Behavioral Quirks of Java Bytecode Decompi...
收藏 引用
19th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM)
作者: Harrand, Nicolas Soto-Valero, Cesar Monperrus, Martin Baudry, Benoit KTH Royal Inst Technol Stockholm Sweden
During compilation from java source code to byte-code, some information is irreversibly lost. In other words, compilation and decompilation of java code is not symmetric. Consequently, the decompilation process, which... 详细信息
来源: 评论
Activating Mobile Agents from Contactless Smart Cards through a java bytecode Extractor
Activating Mobile Agents from Contactless Smart Cards throug...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Lee, Jonathan Lee, Shin-Jie Chen, Hsi-Min Liang, Jeremy Wu, Chia-Ling Wang, Yao-Chiang Natl Cent Univ Dept Comp Sci & Informat Engn Jhongli Taiwan
As mobile agents reside on on-board units or mobile devices and act on behalf of drivers, it imposes a strong demand to devise mechanisms for protecting the algorithms that are exclusively coded in mobile agents for d... 详细信息
来源: 评论
Removing Useless Variables in Cost Analysis of java bytecode  08
Removing Useless Variables in Cost Analysis of Java Bytecode
收藏 引用
23rd Annual ACM Symposium on Applied Computing
作者: Albert, E. Arenas, P. Genaim, S. Puebla, G. Zanardini, D. Univ Complutense Madrid DSIC E-28040 Madrid Spain Tech Univ Madrid CLIP E-28660 Madrid Spain
Automatic cost analysis has interesting applications in the context of verification and certification of mobile code. For instance, the code receiver can use cost information in order to decide whether to reject mobil... 详细信息
来源: 评论
Symbolic backward simulation of java bytecode program  18
Symbolic backward simulation of Java bytecode program
收藏 引用
10th International Conference on Computer Modeling and Simulation (ICCMS)
作者: Inafune, Tetsuya Miura, Shinichi Taketa, Toshihiro Hiranaka, Yukio Yamagata Univ 4-3-16 Jonan Yonezawa Yamagata Japan NTT DATA I Corp Tokyo Japan
We present a new method, symbolic backward simulation, for detecting bugs in java bytecode programs. In order to find bugs comprehensively, the method determines conditions on the input side by tracing back from the t... 详细信息
来源: 评论
MMT: Mutation Testing of java bytecode with Model Transformation
MMT: Mutation Testing of Java Bytecode with Model Transforma...
收藏 引用
ACM/IEEE International Conference on Model Driven Engineering Languages and Systems (MODELS)
作者: Bockisch, Christoph Taentzer, Gabriele Neufeld, Daniel Philipps Univ Marburg Marburg Germany
Mutation testing is an approach to check the robustness of test suites. The program code is slightly changed by mutations to inject errors. A test suite is robust enough if it finds such errors. Tools for mutation tes... 详细信息
来源: 评论
Heap Space Analysis for java bytecode  07
Heap Space Analysis for Java Bytecode
收藏 引用
International Symposium on Memory Management
作者: Albert, Elvira Genaim, Samir Gomez-Zamalloa, Miguel Univ Complutense Madrid DSIC E-28040 Madrid Spain Tech Univ Madrid CLIP Madrid Spain
This article presents a heap space analysis for (sequential) java bytecode. The analysis generates heap space cost relations which define at compile-time the heap consumption of a program as a function of its data siz... 详细信息
来源: 评论
A java bytecode Metamodel for Composable Program Analyses
A Java Bytecode Metamodel for Composable Program Analyses
收藏 引用
Conference on Software Technologies - Applications and Foundations (STAF)
作者: Yildiz, Bugra M. Bockisch, Christoph Rensink, Arend Aksit, Mehmet Univ Twente Enschede Netherlands Philipps Univ Marburg Marburg Germany
Program analyses are an important tool to check if a system fulfills its specification. A typical implementation strategy for program analyses is to use an imperative, general-purpose language like java;and access the... 详细信息
来源: 评论
Mutation Testing of java bytecode: A Model-Driven Approach  24
Mutation Testing of Java Bytecode: A Model-Driven Approach
收藏 引用
27th International Conference on Model Driven Engineering Languages and Systems (MODELS)
作者: Bockisch, Christoph Eren, Deniz Lehmann, Sascha Neufeld, Daniel Taentzer, Gabriele Philipps Univ Marburg Marburg Germany
Mutation testing is an approach to checking the robustness of test suites. The program code is slightly changed by mutations to inject bugs. A test suite is robust enough if it finds such bugs. Mutation testing tools ... 详细信息
来源: 评论
Abstract Interpretation of java bytecode in Sturdy  26
Abstract Interpretation of Java Bytecode in Sturdy
收藏 引用
26th ACM International Conference on Formal Techniques for java-like Programs (FTfJP)
作者: Marx, Stefan Erdweg, Sebastian JGU Mainz Mainz Germany
We develop a framework of definitional abstract interpreters for java bytecode in Sturdy. Specifically, we provide a generic interpreter that abstractly executes java bytecode but resorts to configurable analysis comp... 详细信息
来源: 评论