咨询与建议

限定检索结果

文献类型

  • 43 篇 期刊文献
  • 38 篇 会议
  • 2 篇 学位论文

馆藏范围

  • 83 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 78 篇 工学
    • 69 篇 计算机科学与技术...
    • 43 篇 软件工程
    • 11 篇 电气工程
    • 4 篇 信息与通信工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物医学工程(可授...
  • 3 篇 理学
    • 3 篇 数学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 83 篇 java bytecode
  • 13 篇 static analysis
  • 9 篇 abstract interpr...
  • 8 篇 java
  • 6 篇 decompilation
  • 6 篇 verification
  • 5 篇 termination
  • 5 篇 information flow
  • 4 篇 languages
  • 4 篇 java virtual mac...
  • 4 篇 reverse engineer...
  • 4 篇 theory
  • 4 篇 security
  • 4 篇 low-level langua...
  • 3 篇 instrumentation
  • 3 篇 software piracy
  • 3 篇 embedded systems
  • 3 篇 clone detection
  • 3 篇 program transfor...
  • 3 篇 software protect...

机构

  • 4 篇 univ complutense...
  • 3 篇 philipps univ ma...
  • 3 篇 tech univ madrid...
  • 2 篇 friedrich schill...
  • 2 篇 univ complutense...
  • 2 篇 consejo nacl inv...
  • 2 篇 univ complutense...
  • 2 篇 univ arizona dep...
  • 2 篇 icfai univ fac s...
  • 2 篇 rhein westfal th...
  • 2 篇 tech univ darmst...
  • 2 篇 univ pisa dipart...
  • 2 篇 tech univ madrid...
  • 2 篇 brno university ...
  • 2 篇 hangzhou dianzi ...
  • 2 篇 univ verona i-37...
  • 2 篇 univ verona dipa...
  • 2 篇 cooperat univ ge...
  • 1 篇 queens univ dept...
  • 1 篇 korea adv inst s...

作者

  • 6 篇 gomez-zamalloa m...
  • 6 篇 albert elvira
  • 5 篇 genaim samir
  • 5 篇 spoto fausto
  • 3 篇 puebla german
  • 3 篇 bockisch christo...
  • 2 篇 mueller peter
  • 2 篇 kumar krishan
  • 2 篇 monperrus martin
  • 2 篇 yang jiazha
  • 2 篇 kaur prabhpreet
  • 2 篇 zanardini d.
  • 2 篇 taentzer gabriel...
  • 2 篇 baudry benoit
  • 2 篇 falcone ylies
  • 2 篇 yu dongjin
  • 2 篇 orlov michael
  • 2 篇 otto carsten
  • 2 篇 de francesco nic...
  • 2 篇 neufeld daniel

语言

  • 69 篇 英文
  • 14 篇 其他
检索条件"主题词=Java bytecode"
83 条 记 录,以下是51-60 订阅
排序:
Wit4java: A Violation-Witness Validator for java Verifiers (Competition Contribution)  28th
Wit4Java: A Violation-Witness Validator for Java Verifiers (...
收藏 引用
28th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS) Held as Part of the 25th European Joint Conferences on Theory and Practice of Software (ETAPS)
作者: Wu, Tong Schrammel, Peter Cordeiro, Lucas C. Univ Manchester Manchester Lancs England Univ Sussex Brighton E Sussex England Diffblue Ltd Oxford England
We describe and evaluate a violation-witness validator for java verifiers called Wit4java. It takes a java program with a safety property and the respective violation-witness output by a java verifier to generate a ne... 详细信息
来源: 评论
Advanced POC model-based java instruction folding mechanism
Advanced POC model-based Java instruction folding mechanism
收藏 引用
26th Euromicro Conference
作者: Kim, A Chang, M IIT Dept Comp Sci Chicago IL 60616 USA
Ever since java was introduced world wide, the execution performance has always been a problem. As one of the solutions, a bytecode instruction folding process far java processors was developed in a Picojava model and... 详细信息
来源: 评论
Precise null-pointer analysis
收藏 引用
SOFTWARE AND SYSTEMS MODELING 2011年 第2期10卷 219-252页
作者: Spoto, Fausto Univ Verona I-37100 Verona Italy
In java, C or C++, attempts to dereference the null value result in an exception or a segmentation fault. Hence, it is important to identify those program points where this undesired behaviour might occur or prove the... 详细信息
来源: 评论
LibCapsule: Complete Confinement of Third-Party Libraries in Android Applications
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2022年 第5期19卷 2873-2889页
作者: Qiu, Jun Yang, Xuewu Wu, Huamao Zhou, Yajin Li, Jinku Ma, Jianfeng Xidian Univ Sch Cyber Engn Xian 710071 Shaanxi Peoples R China Zhejiang Univ Coll Comp Sci & Technol Sch Cyber Space & Technol Hangzhou 310027 Zhejiang Peoples R China
Android application (or app) developers increasingly integrate third-party libraries to enrich the functionality of their apps. However, current permission model on Android cannot constrain the behaviors of in-app thi... 详细信息
来源: 评论
Verifying pointer programs using graph grammars
收藏 引用
SCIENCE OF COMPUTER PROGRAMMING 2015年 第Part1期97卷 157-162页
作者: Heinen, Jonathan Jansen, Christina Katoen, Joost-Pieter Noll, Thomas Rhein Westfal TH Aachen Software Modeling & Verificat Grp Aachen Germany
This paper argues that graph grammars naturally model dynamic data structures such as lists, trees and combinations thereof. These grammars can be exploited to obtain finite abstractions of pointer-manipulating progra... 详细信息
来源: 评论
SeByte: Scalable clone and similarity search for bytecode
收藏 引用
SCIENCE OF COMPUTER PROGRAMMING 2014年 第Part4期95卷 426-444页
作者: Keivanloo, Iman Roy, Chanchal K. Rilling, Juergen Queens Univ Dept Elect & Comp Engn Kingston ON K7L 3N6 Canada Univ Saskatchewan Dept Comp Sci Saskatoon SK S7N 0W0 Canada Concordia Univ Dept Comp Sci Montreal PQ Canada
While source code clone detection is a well-established research area, finding similar code fragments in binary and other intermediate code representations has been not yet that widely studied. In this paper, we intro... 详细信息
来源: 评论
Heap space analysis for garbage collected languages
收藏 引用
SCIENCE OF COMPUTER PROGRAMMING 2013年 第9期78卷 1427-1448页
作者: Albert, Elvira Genaim, Samir Gomez-Zamalloa, Miguel Univ Complutense Madrid DSIC E-28040 Madrid Spain
Accurately predicting the dynamic memory consumption (or heap space) of programs can be critical during software development. It is well-known that garbage collection (GC) complicates such problem. The peak heap consu... 详细信息
来源: 评论
Conditional termination of loops over heap-allocated data
收藏 引用
SCIENCE OF COMPUTER PROGRAMMING 2014年 第PartA期92卷 2-24页
作者: Alberta, Elvira Arenas, Puri Genaim, Samir Puebla, German Roman-Diez, Guillermo Complutense Univ Madrid UCM DSIC Madrid Spain Tech Univ Madrid UPM DLSIIS Madrid Spain
Static analysis which takes into account the values of data stored in the heap is considered complex and computationally intractable in practice. Thus, most static analyzers do not keep track of object fields nor of a... 详细信息
来源: 评论
ARDEN2bytecode: A one-pass Arden Syntax compiler for service-oriented decision support systems based on the OSGi platform
收藏 引用
COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE 2012年 第2期106卷 114-125页
作者: Gietzelt, Matthias Goltz, Ursula Grunwald, Daniel Lochau, Matte Marschollek, Michael Song, Bianying Wolf, Klaus-Hendrik Tech Univ Carolo Wilhelmina Braunschweig Inst Technol Peter L Reichertz Inst Med Informat D-38106 Braunschweig Germany Hannover Med Sch D-38106 Braunschweig Germany Tech Univ Carolo Wilhelmina Braunschweig Inst Technol Inst Programming & React Syst D-38106 Braunschweig Germany
Patient empowerment might be one key to reduce the pressure on health care systems challenged by the expected demographic changes. Knowledge based systems can, in combination with automated sensor measurements, improv... 详细信息
来源: 评论
Extrakce grafu toku řízení z bajtkódu java
Extrakce grafu toku řízení z bajtkódu Java
收藏 引用
作者: Sečkařová, Petra Brno University of Technology
Grafy toku řízení (Control Flow Graph -- CFG) slouží jako základ pro mnoho analýz vyhodnocujících kvalitu programu. Takovou analýzou je i testování založené na mo... 详细信息
来源: 评论