咨询与建议

限定检索结果

文献类型

  • 9 册 图书
  • 2 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 12 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 3 篇 计算机科学与技术...
    • 2 篇 软件工程
    • 1 篇 电气工程

主题

  • 12 篇 compiled code
  • 6 篇 entry point
  • 6 篇 library
  • 5 篇 control block
  • 5 篇 save area
  • 5 篇 code
  • 4 篇 control
  • 4 篇 data
  • 4 篇 module
  • 4 篇 program
  • 3 篇 parameter
  • 3 篇 character string
  • 3 篇 format
  • 3 篇 error
  • 3 篇 entry
  • 3 篇 control blocks
  • 3 篇 compiled
  • 3 篇 code entry
  • 3 篇 dope vector
  • 3 篇 function

机构

  • 1 篇 digital equipmen...
  • 1 篇 bandung inst tec...
  • 1 篇 alexandru ioan c...

作者

  • 1 篇 bell jr
  • 1 篇 mandala rila
  • 1 篇 popescu adrian s...
  • 1 篇 balan gheorghe
  • 1 篇 karnalim oscar

语言

  • 12 篇 英文
检索条件"主题词=compiled code"
12 条 记 录,以下是1-10 订阅
排序:
THREADED code
收藏 引用
COMMUNICATIONS OF THE ACM 1973年 第6期16卷 370-372页
作者: BELL, JR DIGITAL EQUIPMENT CORP MAYNARDMA 01754
The concept of “threaded code” is presented as an alternative to machine language code. Hardware and software realizations of it are given. In software it is realized as interpretive code not needing an interpreter.... 详细信息
来源: 评论
Java Archives Search Engine Using Byte code as Information Source
Java Archives Search Engine Using Byte Code as Information S...
收藏 引用
International Conference on Data and Software Engineering ICODSE
作者: Karnalim, Oscar Mandala, Rila Bandung Inst Technol Sch Elect Engn & Informat Bandung Indonesia
Information from computer programs can be extracted from its source code, external documentation, and compiled code. Although compiled code is an assured information source which is always exists in published computer... 详细信息
来源: 评论
Detecting Java compiled Malware using Machine Learning Techniques  20
Detecting Java Compiled Malware using Machine Learning Techn...
收藏 引用
20th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)
作者: Balan, Gheorghe Popescu, Adrian Stefan Alexandru Ioan Cuza Univ Bitdefender Lab Fac Comp Sci Iasi Romania
Malicious software using Java Language in order to implement the attack evolved rapidly in the past years. Initially we were used to find malicious Applets and exploitation methods to escape the controlled environment... 详细信息
来源: 评论
Ibm :: 370 :: Pli :: Sc33-0025-2 Pliexlgic Apr73
收藏 引用
2016年
Ibm :: 370 :: Pli :: Sc33-0025-2 Pliexlgic Apr73 by published by
来源: 评论
Mitre :: Esd Technical Reports :: Esd-Tr-71-343 the Ecl Programming System Aug71
收藏 引用
2016年
[Auto Generated] SECTION I. INTRODUCTION 1 SECTION II. SYSTEM ORGANIZATION AND DESIGN PHILOSOPHY 4 SECTION III. SYSTEM FACILITIES 10 3. 1 Syntax Extension 10 3. 2 Storage Management 12 3. 3 Data Type Extensions 13 3.4... 详细信息
来源: 评论
Ibm :: 370 :: Pli :: Ly33-6012-1 Pli Transient Library Plm Oct76
收藏 引用
2016年
Ibm :: 370 :: Pli :: Ly33-6012-1 Pli Transient Library Plm Oct76 by published by
来源: 评论
Ibm :: 360 :: Pli :: Y28 6801-4 Pl1Subrplm Nov68
收藏 引用
2016年
Ibm :: 360 :: Pli :: Y28 6801-4 Pl1Subrplm Nov68 by published by
来源: 评论
Ibm :: 360 :: Pli :: Gy28-6801-6 Pli Subroutine Library Plm Jun72
收藏 引用
2016年
Ibm :: 360 :: Pli :: Gy28-6801-6 Pli Subroutine Library Plm Jun72 by published by
来源: 评论
Symbolics :: Software :: Release 5 :: 4B Program Development Tools
收藏 引用
2016年
Symbolics :: Software :: Release 5 :: 4B Program Development Tools by published by
来源: 评论
Mit :: Cadr :: Chinual 5Thed Jan83 :: Chinualjan83 02 Primobjtyp
收藏 引用
2016年
Mit :: Cadr :: Chinual 5Thed Jan83 :: Chinualjan83 02 Primobjtyp by published by
来源: 评论