咨询与建议

限定检索结果

文献类型

  • 43 篇 期刊文献
  • 38 篇 会议
  • 2 篇 学位论文

馆藏范围

  • 83 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 78 篇 工学
    • 69 篇 计算机科学与技术...
    • 43 篇 软件工程
    • 11 篇 电气工程
    • 4 篇 信息与通信工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物医学工程(可授...
  • 3 篇 理学
    • 3 篇 数学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 83 篇 java bytecode
  • 13 篇 static analysis
  • 9 篇 abstract interpr...
  • 8 篇 java
  • 6 篇 decompilation
  • 6 篇 verification
  • 5 篇 termination
  • 5 篇 information flow
  • 4 篇 languages
  • 4 篇 java virtual mac...
  • 4 篇 reverse engineer...
  • 4 篇 theory
  • 4 篇 security
  • 4 篇 low-level langua...
  • 3 篇 instrumentation
  • 3 篇 software piracy
  • 3 篇 embedded systems
  • 3 篇 clone detection
  • 3 篇 program transfor...
  • 3 篇 software protect...

机构

  • 4 篇 univ complutense...
  • 3 篇 philipps univ ma...
  • 3 篇 tech univ madrid...
  • 2 篇 friedrich schill...
  • 2 篇 univ complutense...
  • 2 篇 consejo nacl inv...
  • 2 篇 univ complutense...
  • 2 篇 univ arizona dep...
  • 2 篇 icfai univ fac s...
  • 2 篇 rhein westfal th...
  • 2 篇 tech univ darmst...
  • 2 篇 univ pisa dipart...
  • 2 篇 tech univ madrid...
  • 2 篇 brno university ...
  • 2 篇 hangzhou dianzi ...
  • 2 篇 univ verona i-37...
  • 2 篇 univ verona dipa...
  • 2 篇 cooperat univ ge...
  • 1 篇 queens univ dept...
  • 1 篇 korea adv inst s...

作者

  • 6 篇 gomez-zamalloa m...
  • 6 篇 albert elvira
  • 5 篇 genaim samir
  • 5 篇 spoto fausto
  • 3 篇 puebla german
  • 3 篇 bockisch christo...
  • 2 篇 mueller peter
  • 2 篇 kumar krishan
  • 2 篇 monperrus martin
  • 2 篇 yang jiazha
  • 2 篇 kaur prabhpreet
  • 2 篇 zanardini d.
  • 2 篇 taentzer gabriel...
  • 2 篇 baudry benoit
  • 2 篇 falcone ylies
  • 2 篇 yu dongjin
  • 2 篇 orlov michael
  • 2 篇 otto carsten
  • 2 篇 de francesco nic...
  • 2 篇 neufeld daniel

语言

  • 69 篇 英文
  • 14 篇 其他
检索条件"主题词=Java bytecode"
83 条 记 录,以下是41-50 订阅
排序:
Coverage testing of java programs and components
收藏 引用
SCIENCE OF COMPUTER PROGRAMMING 2005年 第1-2期56卷 211-230页
作者: Vincenzi, AMR Maldonado, JC Wong, WE Delamaro, ME Univ Sao Paulo Inst Ciencias Matemat & Computacao BR-13560 Sao Carlos SP Brazil Univ Texas Dept Comp Sci Richardson TX 75080 USA Ctr Univ Euripides Marilia BR-17525901 Marilia SP Brazil
Although software testing is a crucial activity in the software development process, only recently have more sound and consistent testing tools become available for testing java programs and their components. These to... 详细信息
来源: 评论
JCSI: A tool for checking secure information flow in java Card applications
收藏 引用
JOURNAL OF SYSTEMS AND SOFTWARE 2012年 第11期85卷 2479-2493页
作者: Avvenuti, Marco Bernardeschi, Cinzia De Francesco, Nicoletta Masci, Paolo Univ Pisa Dept Informat Engn I-56126 Pisa Italy Queen Mary Univ London Sch Elect Engn & Comp Sci London E1 4NS England
This paper describes a tool for checking secure information flow in java Card applications. The tool performs a static analysis of java Card CAP files and includes a CAP viewer. The analysis is based on the theory of ... 详细信息
来源: 评论
Architecture Independent Characterization of Embedded java Workloads
IEEE COMPUTER ARCHITECTURE LETTERS
收藏 引用
IEEE COMPUTER ARCHITECTURE LETTERS 2009年 第1期8卷 29-32页
作者: Desai, Aniruddha Singh, Jugdutt La Trobe Univ Bundoora Vic 3086 Australia
This paper presents architecture independent characterization of embedded java workloads based on the industry standard GrinderBench benchmark which includes different classes of real world embedded java applications.... 详细信息
来源: 评论
An annotation-aware java virtual machine implementation
收藏 引用
CONCURRENCY-PRACTICE AND EXPERIENCE 2000年 第6期12卷 423-444页
作者: Azevedo, A Nicolau, A Hummel, J Univ Calif Irvine Dept Informat & Comp Sci Irvine CA 92697 USA Univ Illinois Chicago IL USA
The java bytecode language lacks expressiveness for traditional compiler optimizations, making this portable, secure software distribution format inefficient as a program representation for high performance. This inef... 详细信息
来源: 评论
A NOVEL MECHANISM FOR GRIDIFICATION OF COMPILED java APPLICATIONS
收藏 引用
COMPUTING AND INFORMATICS 2011年 第6期30卷 1259-1285页
作者: Mateos, Cristian Zunino, Alejandro Trachsel, Ramiro Campo, Marcelo ISISTAN UNICEN Tandil Buenos Aires Argentina Consejo Nacl Invest Cient & Tecn RA-1033 Buenos Aires DF Argentina
Exploiting Grids intuitively requires developers to alter their applications, which calls for expertise on Grid programming. Gridification tools address this problem by semi-automatically making user applications to b... 详细信息
来源: 评论
Flight of the FINCH Through the java Wilderness
收藏 引用
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION 2011年 第2期15卷 166-182页
作者: Orlov, Michael Sipper, Moshe Ben Gurion Univ Negev Dept Comp Sci IL-84105 Beer Sheva Israel
We describe Fertile Darwinian bytecode Harvester (FINCH), a methodology for evolving java bytecode, enabling the evolution of extant, unrestricted java programs, or programs in other languages that compile to java byt... 详细信息
来源: 评论
Pushing java Type Obfuscation to the Limit
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2014年 第6期11卷 553-567页
作者: Foket, Christophe De Sutter, Bjorn De Bosschere, Koen Univ Ghent Dept Elect & Informat Syst Comp Syst Lab B-9000 Ghent Belgium
bytecoded .Net and java programs reveal type information through encoded type hierarchies, casts, field declarations and method signatures. This facilitates bytecode verification, but it also helps reverse engineers. ... 详细信息
来源: 评论
Detecting theft of java applications via a static birthmark based on weighted stack patterns
收藏 引用
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS 2008年 第9期E91D卷 2323-2332页
作者: Lim, Hyun-il Park, Heewan choi, Seokwoo Han, Taisook Korea Adv Inst Sci & Technol Div Comp Sci Taejon South Korea Inst Elect Informat & Commun Engineers Tokyo Japan
A software birthmark means the inherent characteristics of a program that can be used to identify the program. A comparison of such birthmarks facilitates the detection of software theft. In this paper, we propose a s... 详细信息
来源: 评论
JShrink: In-Depth Investigation into Debloating Modern java Applications  2020
JShrink: In-Depth Investigation into Debloating Modern Java ...
收藏 引用
28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE)
作者: Bruce, Bobby R. Zhang, Tianyi Arora, Jaspreet Xu, Guoqing Harry Kim, Miryung Univ Calif Davis Davis CA 95616 USA Harvard Univ Cambridge MA 02138 USA Univ Calif Los Angeles Los Angeles CA 90024 USA
Modern software is bloated. Demand for new functionality has led developers to include more and more features, many of which become unneeded or unused as software evolves. This phenomenon, known as software bloat, res... 详细信息
来源: 评论
Constraint-Logic Object-Oriented Programming on the java Virtual Machine  22
Constraint-Logic Object-Oriented Programming on the Java Vir...
收藏 引用
37th Annual ACM Symposium on Applied Computing
作者: Winkelmann, Hendrik Kuchen, Herbert Univ Munster Munster Germany
Constraint-logic object-oriented programming is a paradigm by means of which multiple application areas, such as the formulation of and solving constraint-satisfaction problems, the systematic generation of object gra... 详细信息
来源: 评论