咨询与建议

限定检索结果

文献类型

  • 43 篇 期刊文献
  • 38 篇 会议
  • 2 篇 学位论文

馆藏范围

  • 83 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 78 篇 工学
    • 69 篇 计算机科学与技术...
    • 43 篇 软件工程
    • 11 篇 电气工程
    • 4 篇 信息与通信工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物医学工程(可授...
  • 3 篇 理学
    • 3 篇 数学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 83 篇 java bytecode
  • 13 篇 static analysis
  • 9 篇 abstract interpr...
  • 8 篇 java
  • 6 篇 decompilation
  • 6 篇 verification
  • 5 篇 termination
  • 5 篇 information flow
  • 4 篇 languages
  • 4 篇 java virtual mac...
  • 4 篇 reverse engineer...
  • 4 篇 theory
  • 4 篇 security
  • 4 篇 low-level langua...
  • 3 篇 instrumentation
  • 3 篇 software piracy
  • 3 篇 embedded systems
  • 3 篇 clone detection
  • 3 篇 program transfor...
  • 3 篇 software protect...

机构

  • 4 篇 univ complutense...
  • 3 篇 philipps univ ma...
  • 3 篇 tech univ madrid...
  • 2 篇 friedrich schill...
  • 2 篇 univ complutense...
  • 2 篇 consejo nacl inv...
  • 2 篇 univ complutense...
  • 2 篇 univ arizona dep...
  • 2 篇 icfai univ fac s...
  • 2 篇 rhein westfal th...
  • 2 篇 tech univ darmst...
  • 2 篇 univ pisa dipart...
  • 2 篇 tech univ madrid...
  • 2 篇 brno university ...
  • 2 篇 hangzhou dianzi ...
  • 2 篇 univ verona i-37...
  • 2 篇 univ verona dipa...
  • 2 篇 cooperat univ ge...
  • 1 篇 queens univ dept...
  • 1 篇 korea adv inst s...

作者

  • 6 篇 gomez-zamalloa m...
  • 6 篇 albert elvira
  • 5 篇 genaim samir
  • 5 篇 spoto fausto
  • 3 篇 puebla german
  • 3 篇 bockisch christo...
  • 2 篇 mueller peter
  • 2 篇 kumar krishan
  • 2 篇 monperrus martin
  • 2 篇 yang jiazha
  • 2 篇 kaur prabhpreet
  • 2 篇 zanardini d.
  • 2 篇 taentzer gabriel...
  • 2 篇 baudry benoit
  • 2 篇 falcone ylies
  • 2 篇 yu dongjin
  • 2 篇 orlov michael
  • 2 篇 otto carsten
  • 2 篇 de francesco nic...
  • 2 篇 neufeld daniel

语言

  • 69 篇 英文
  • 14 篇 其他
检索条件"主题词=java bytecode"
83 条 记 录,以下是11-20 订阅
排序:
BAT(2)XML: XML-based java bytecode Representation
收藏 引用
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE 2005年 第1期141卷 93-107页
作者: Eichberg, Michael Tech Univ Darmstadt Dept Comp Sci Darmstadt Germany
The creation, transformation and analysis of bytecode is widespread. Nevertheless, several problems related to the reusability and comprehensibility of the results and tools exist. In particular, the results of tools ... 详细信息
来源: 评论
An Efficient, Parametric Fixpoint Algorithm for Analysis of java bytecode
收藏 引用
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE 2007年 第1期190卷 51-66页
作者: Mendez, Mario Navas, Jorge Hermenegildo, Manuel V. Univ New Mexico Dept Comp Sci Albuquerque NM 87131 USA Tech Univ Madrid Madrid Spain
interpretation has been widely used for the analysis of object-oriented languages and, in particular, java source and bytecode. However, while most existing work deals with the problem of finding expressive abstract d... 详细信息
来源: 评论
Vulnerabilities Constraint Based Analysis Approach for java bytecode Programs  6
Vulnerabilities Constraint Based Analysis Approach for Java ...
收藏 引用
6th International Conference on Multimedia Computing and Systems (ICMCS)
作者: Achour, Safaa Benattou, Mohammed Ibn Tofail Univ LASTID Lab Kenitra Morocco
The verification process of software is of growing importance as it helps to assure that an application is correctly built. However, an efficient verification method of implementation of an application should also rej... 详细信息
来源: 评论
A java bytecode Formalisation  1
收藏 引用
10th International Working Conference on Verified Software - Theories, Tools, and Experiments (VSTTE) held as Part of the Federated Logic Conference (FLoC)
作者: Czarnik, Patryk Chrzaszcz, Jacek Schubert, Aleksy Univ Warsaw Inst Informat Ul S Banacha 2 PL-02097 Warsaw Poland
This paper presents the first Coq formalisation of the full java bytecode instruction set and its semantics. The set of instructions is organised in a hierarchy depending on how the instructions deal with the runtime ... 详细信息
来源: 评论
AUTOMATED TERMINATION ANALYSIS OF java bytecode BY TERM REWRITING
AUTOMATED TERMINATION ANALYSIS OF JAVA BYTECODE BY TERM REWR...
收藏 引用
21st International Conference on Rewriting Techniques and Applications (RTA) as part of the 5th International Federated Logic Conference (FLOC)
作者: Otto, Carsten Brockschmidt, Marc von Essen, Christian Giesl, Juergen Rhein Westfal TH Aachen LuFG Informat 2 Aachen Germany
We present an automated approach to prove termination of java bytecode (JBC) programs by automatically transforming them to term rewrite systems (TRSs). In this way, the numerous techniques and tools developed for TRS... 详细信息
来源: 评论
Symbolic backward simulation of java bytecode program  18
Symbolic backward simulation of Java bytecode program
收藏 引用
10th International Conference on Computer Modeling and Simulation (ICCMS)
作者: Inafune, Tetsuya Miura, Shinichi Taketa, Toshihiro Hiranaka, Yukio Yamagata Univ 4-3-16 Jonan Yonezawa Yamagata Japan NTT DATA I Corp Tokyo Japan
We present a new method, symbolic backward simulation, for detecting bugs in java bytecode programs. In order to find bugs comprehensively, the method determines conditions on the input side by tracing back from the t... 详细信息
来源: 评论
A Comparative Analysis of Static and Dynamic java bytecode Watermarking Algorithms  50th
A Comparative Analysis of Static and Dynamic Java Bytecode W...
收藏 引用
50th Annual Convention of the Computer-Society-of-India (CSI) on Digital Life
作者: Kumar, Krishan Kaur, Prabhpreet ICFAI Univ Fac Sci & Technol Baddi HP India Gum Nanak Dev Univ Dept Comp Sci & Technol Amritsar Punjab India
Software piracy is one of the most serious issues confronted by software industry creating a huge number of dollars misfortune consistently to the product creating organizations. The worldwide income misfortune was as... 详细信息
来源: 评论
Mutation Testing of java bytecode: A Model-Driven Approach  24
Mutation Testing of Java Bytecode: A Model-Driven Approach
收藏 引用
27th International Conference on Model Driven Engineering Languages and Systems (MODELS)
作者: Bockisch, Christoph Eren, Deniz Lehmann, Sascha Neufeld, Daniel Taentzer, Gabriele Philipps Univ Marburg Marburg Germany
Mutation testing is an approach to checking the robustness of test suites. The program code is slightly changed by mutations to inject bugs. A test suite is robust enough if it finds such bugs. Mutation testing tools ... 详细信息
来源: 评论
Abstract Interpretation of java bytecode in Sturdy  26
Abstract Interpretation of Java Bytecode in Sturdy
收藏 引用
26th ACM International Conference on Formal Techniques for java-like Programs (FTfJP)
作者: Marx, Stefan Erdweg, Sebastian JGU Mainz Mainz Germany
We develop a framework of definitional abstract interpreters for java bytecode in Sturdy. Specifically, we provide a generic interpreter that abstractly executes java bytecode but resorts to configurable analysis comp... 详细信息
来源: 评论
MMT: Mutation Testing of java bytecode with Model Transformation
MMT: Mutation Testing of Java Bytecode with Model Transforma...
收藏 引用
ACM/IEEE International Conference on Model Driven Engineering Languages and Systems (MODELS)
作者: Bockisch, Christoph Taentzer, Gabriele Neufeld, Daniel Philipps Univ Marburg Marburg Germany
Mutation testing is an approach to check the robustness of test suites. The program code is slightly changed by mutations to inject errors. A test suite is robust enough if it finds such errors. Tools for mutation tes... 详细信息
来源: 评论