咨询与建议

限定检索结果

文献类型

  • 72 篇 会议
  • 49 篇 期刊文献
  • 9 篇 学位论文
  • 1 册 图书

馆藏范围

  • 131 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 116 篇 工学
    • 93 篇 计算机科学与技术...
    • 73 篇 软件工程
    • 19 篇 电气工程
    • 15 篇 信息与通信工程
    • 7 篇 控制科学与工程
    • 2 篇 机械工程
    • 1 篇 测绘科学与技术
    • 1 篇 网络空间安全
  • 2 篇 理学
    • 1 篇 数学
    • 1 篇 物理学
    • 1 篇 系统科学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 公共管理
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 医学
    • 1 篇 公共卫生与预防医...

主题

  • 131 篇 bytecode
  • 35 篇 java
  • 13 篇 jvm
  • 9 篇 static analysis
  • 6 篇 java virtual mac...
  • 6 篇 optimization
  • 6 篇 android
  • 6 篇 machine learning
  • 5 篇 ethereum
  • 5 篇 instrumentation
  • 5 篇 decompilation
  • 5 篇 data representat...
  • 5 篇 security
  • 5 篇 malware
  • 5 篇 virtual machine
  • 4 篇 compilers
  • 4 篇 smart contracts
  • 4 篇 program analysis
  • 4 篇 smart contract
  • 4 篇 virtual machines

机构

  • 4 篇 tu wien austria
  • 4 篇 brno university ...
  • 3 篇 sun yat sen univ...
  • 2 篇 ecole polytech f...
  • 2 篇 friedrich schill...
  • 2 篇 delft univ techn...
  • 2 篇 delft univ techn...
  • 2 篇 univ tennessee d...
  • 2 篇 ecole polytech f...
  • 2 篇 charles universi...
  • 2 篇 shopify ottawa o...
  • 2 篇 univ oregon dept...
  • 2 篇 sun yat sen univ...
  • 2 篇 univ athens gr-1...
  • 1 篇 loria campus sci...
  • 1 篇 deakin univ sch ...
  • 1 篇 beijing univ tec...
  • 1 篇 univ electrocomm...
  • 1 篇 laval univ dept ...
  • 1 篇 shopify ny usa

作者

  • 4 篇 odersky martin
  • 4 篇 ureche vlad
  • 3 篇 tan yiyu
  • 3 篇 durieux thomas
  • 3 篇 salzer gernot
  • 3 篇 chen xiangping
  • 3 篇 amme wolfram
  • 3 篇 fong anthony s.
  • 3 篇 budimac zoran
  • 3 篇 di angelo monika
  • 3 篇 huang yuan
  • 3 篇 pracner doni
  • 2 篇 mbarki samir
  • 2 篇 gibbs noah
  • 2 篇 biboudis aggelos
  • 2 篇 visser eelco
  • 2 篇 wu si xing (alan...
  • 2 篇 zheng zibin
  • 2 篇 dongarra j
  • 2 篇 baudry benoit

语言

  • 115 篇 英文
  • 12 篇 其他
  • 3 篇 中文
  • 1 篇 德文
检索条件"主题词=bytecode"
131 条 记 录,以下是1-10 订阅
排序:
Automating Comment Generation for Smart Contract from bytecode
收藏 引用
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY 2025年 第3期34卷 1-31页
作者: Xiang, Jianhang Gao, Zhipeng Bao, Lingfeng Hu, Xing Chen, Jiayuan Xia, Xin Zhejiang Univ State Key Lab Blockchain & Data Secur Hangzhou Peoples R China Zhejiang Univ State Key Lab Blockchain & Data Secur Shanghai Peoples R China Hangzhou High Tech Zone Binjiang Blockchain & Data Hangzhou Peoples R China Ohio State Univ Columbus OH USA
Recently, smart contracts have played a vital role in automatic financial and business transactions. To help end users without programming background to better understand the logic of smart contracts, previous studies... 详细信息
来源: 评论
An alternative to code comment generation? Generating comment from bytecode
收藏 引用
INFORMATION AND SOFTWARE TECHNOLOGY 2025年 179卷
作者: Chen, Xiangping Chen, Junqi Lian, Zhilu Huang, Yuan Zhou, Xiaocong Wu, Yunzhi Zheng, Zibin Sun Yat Sen Univ Sch Software Engn Zhuhai Peoples R China Sun Yat Sen Univ Sch Journalism & Commun Guangzhou Peoples R China Sun Yat Sen Univ Guangzhou Peoples R China Sch Comp Sci & Engn Guangzhou Peoples R China Guangzhou Modern Informat Engn Coll Sch Econ & Management Guangzhou Peoples R China
Context: Due to the importance and necessity of code comments, recent works propose many comment generation models with source code as input. But sometimes there has no access to obtain the source code, only the bytec... 详细信息
来源: 评论
bytecode Analysis for Proof Carrying Code
收藏 引用
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE 2005年 第1期141卷 19-34页
作者: Wildmoser, Martin Chaieb, Amine Nipkow, Tobias Tech Univ Munich Inst Informat Munich Germany
Out of annotated programs proof carrying code systems construct and prove verification conditions that guarantee a given safety policy. The annotations may come from various program analyzers and must not be trusted a... 详细信息
来源: 评论
bytecode Heuristic Signatures for Detecting Malware Behavior  2
Bytecode Heuristic Signatures for Detecting Malware Behavior
收藏 引用
2nd International Conference on Next Generation Computing Applications (NextComp)
作者: Hajmasan, Gheorghe Mondoc, Alexandra Cret, Octavian Tech Univ Cluj Napoca Bitdefender Cluj Napoca Romania Babes Bolyai Univ Bitdefender Cluj Napoca Romania Tech Univ Cluj Napoca Cluj Napoca Romania
For a long time, the most important approach for detecting malicious applications was the use of static, hash-based signatures. This approach provides a fast response time, has a low performance overhead and is very s... 详细信息
来源: 评论
Android malware detection method based on bytecode image
收藏 引用
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING 2020年 第5期14卷 6401-6410页
作者: Ding, Yuxin Zhang, Xiao Hu, Jieke Xu, Wenting Harbin Inst Technol Dept Comp Sci & Technol Shenzhen Peoples R China
Traditional machine learning based malware detection methods often use decompiling techniques or dynamic monitoring techniques to extract the feature representation of malware. This procedure is time consuming and str... 详细信息
来源: 评论
JBInsTrace: A tracer of Java and JRE classes at basic-block granularity by dynamically instrumenting bytecode
收藏 引用
SCIENCE OF COMPUTER PROGRAMMING 2014年 79卷 116-125页
作者: Caserta, Pierre Zendra, Olivier LORIA Campus Sci F-54603 Villers Les Nancy France INRIA Nancy Grand Est LORIA F-54603 Villers Les Nancy France
Understanding what happens during the runtime of a Java program is difficult. Tracking runtime flow can bring valuable information for program understanding and behavior analysis. Polymorphism, thread concurrency or e... 详细信息
来源: 评论
A type system for Java bytecode subroutines
收藏 引用
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS 1999年 第1期21卷 90-137页
作者: Stata, R Abadi, M Digital Equipment Corp Syst Res Ctr Palo Alto CA 94301 USA
Java is typically compiled into an intermediate language, JVML, that is interpreted by the Java Virtual Machine. Because mobile JVML code is not always trusted, a bytecode verifier enforces static constraints that pre... 详细信息
来源: 评论
Coverage-Based Debloating for Java bytecode
收藏 引用
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY 2023年 第2期32卷 1-34页
作者: Soto-Valero, Cesar Durieux, Thomas Harrand, Nicolas Baudry, Benoit KTH Royal Inst Technol Dept Software & Comp Syst Stockholm Sweden
Software bloat is code that is packaged in an application but is actually not necessary to run the application. The presence of software bloat is an issue for security, performance, and for maintenance. In this articl... 详细信息
来源: 评论
BCGen: a comment generation method for bytecode
收藏 引用
AUTOMATED SOFTWARE ENGINEERING 2023年 第1期30卷 1-31页
作者: Huang, Yuan Huang, Jinbo Chen, Xiangping He, Kunning Zhou, Xiaocong Sun Yat Sen Univ Sch Software Engn Zhuhai 519000 Guangdong Peoples R China Sun Yat Sen Univ Sch Journalism & Commun Guangdong Key Lab Big Data Anal & Simulat Publ Opi Guangzhou 510000 Guangdong Peoples R China Sun Yat Sen Univ Sch Comp Sci & Engn Guangzhou 510000 Guangdong Peoples R China
bytecode is a form of instruction set designed for efficient execution by a software interpreter. Unlike human-readable source code, bytecode is even harder to understand for programmers and researchers. bytecode has ... 详细信息
来源: 评论
bytecode Generation for XQuery Compiler
Bytecode Generation for XQuery Compiler
收藏 引用
1st International Workshop on Database Technology and Applications
作者: Chen, Yue Yuan, Fei Liao, Husheng Beijing Univ Technol Coll Comp Sci Beijing Peoples R China
This paper represents a compiler for XQuery that obtains a more efficient performance by translating its programs to Java bytecode. It gives an overview of the system design with multi-phase translation structure, and... 详细信息
来源: 评论