咨询与建议

限定检索结果

文献类型

  • 43 篇 期刊文献
  • 38 篇 会议
  • 2 篇 学位论文

馆藏范围

  • 83 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 78 篇 工学
    • 69 篇 计算机科学与技术...
    • 43 篇 软件工程
    • 11 篇 电气工程
    • 4 篇 信息与通信工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物医学工程(可授...
  • 3 篇 理学
    • 3 篇 数学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 83 篇 java bytecode
  • 13 篇 static analysis
  • 9 篇 abstract interpr...
  • 8 篇 java
  • 6 篇 decompilation
  • 6 篇 verification
  • 5 篇 termination
  • 5 篇 information flow
  • 4 篇 languages
  • 4 篇 java virtual mac...
  • 4 篇 reverse engineer...
  • 4 篇 theory
  • 4 篇 security
  • 4 篇 low-level langua...
  • 3 篇 instrumentation
  • 3 篇 software piracy
  • 3 篇 embedded systems
  • 3 篇 clone detection
  • 3 篇 program transfor...
  • 3 篇 software protect...

机构

  • 4 篇 univ complutense...
  • 3 篇 philipps univ ma...
  • 3 篇 tech univ madrid...
  • 2 篇 friedrich schill...
  • 2 篇 univ complutense...
  • 2 篇 consejo nacl inv...
  • 2 篇 univ complutense...
  • 2 篇 univ arizona dep...
  • 2 篇 icfai univ fac s...
  • 2 篇 rhein westfal th...
  • 2 篇 tech univ darmst...
  • 2 篇 univ pisa dipart...
  • 2 篇 tech univ madrid...
  • 2 篇 brno university ...
  • 2 篇 hangzhou dianzi ...
  • 2 篇 univ verona i-37...
  • 2 篇 univ verona dipa...
  • 2 篇 cooperat univ ge...
  • 1 篇 queens univ dept...
  • 1 篇 korea adv inst s...

作者

  • 6 篇 gomez-zamalloa m...
  • 6 篇 albert elvira
  • 5 篇 genaim samir
  • 5 篇 spoto fausto
  • 3 篇 puebla german
  • 3 篇 bockisch christo...
  • 2 篇 mueller peter
  • 2 篇 kumar krishan
  • 2 篇 monperrus martin
  • 2 篇 yang jiazha
  • 2 篇 kaur prabhpreet
  • 2 篇 zanardini d.
  • 2 篇 taentzer gabriel...
  • 2 篇 baudry benoit
  • 2 篇 falcone ylies
  • 2 篇 yu dongjin
  • 2 篇 orlov michael
  • 2 篇 otto carsten
  • 2 篇 de francesco nic...
  • 2 篇 neufeld daniel

语言

  • 69 篇 英文
  • 14 篇 其他
检索条件"主题词=java bytecode"
83 条 记 录,以下是61-70 订阅
排序:
bytecode Rewriting in Tom
收藏 引用
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE 2007年 第1期190卷 19-33页
作者: Balland, Emilie Moreau, Pierre-Etienne Reilles, Antoine INRIA & LORIA LORIA F-54506 Vandoeuvre Les Nancy France INPL & LORIA LORIA F-54506 Vandoeuvre Les Nancy France
In this paper, we present a term rewriting based library for manipulating java bytecode. We define a mapping from bytecode programs to algebraic terms, and we use Tom, an extension of java that adds pattern-matching f... 详细信息
来源: 评论
Formal Translation of bytecode into BoogiePL
收藏 引用
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE 2007年 第1期190卷 35-50页
作者: Lehner, Hermann Mueller, Peter Swiss Fed Inst Technol Zurich Switzerland
Many modern program verifiers translate the program to be verified and its specification into a simple intermediate representation and then compute verification conditions on this representation. Using an intermediate... 详细信息
来源: 评论
A Program Logic for bytecode
收藏 引用
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE 2005年 第1期141卷 255-273页
作者: Bannwart, Fabian Mueller, Peter ETH CH-8092 Zurich Switzerland
Program logics for bytecode languages such as java bytecode or the .NET CIL can be used to apply Proof-Carrying Code concepts to bytecode programs and to verify correctness properties of bytecode programs. This paper ... 详细信息
来源: 评论
Zpětný překladač bajtkódu jazyka java
Zpětný překladač bajtkódu jazyka Java
收藏 引用
作者: Hřibal, Jaromír Brno University of Technology
První část této bakalářské práce se zabývá základními principy virtuálního stroje jazyka java a detailněji se věnuje jeho instrukční sadě a formá... 详细信息
来源: 评论
Translate One, Analyze Many: Leveraging the Microsoft Intermediate Language and Source Code Transformation for Model Checking
收藏 引用
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE 2007年 第1期190卷 3-18页
作者: McGeachie, Jesse Dingel, Juergen Queens Univ Sch Comp Kingston ON Canada
In this paper we present a source transformation-based framework to support model checking of source code written with languages belonging to Microsoft's. NET platform. The framework includes a set of source trans... 详细信息
来源: 评论
Encoding the java Virtual Machine's Instruction Set
收藏 引用
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE 2010年 第4期264卷 35-50页
作者: Eichberg, Michael Sewe, Andreas Tech Univ Darmstadt Dept Comp Sci Darmstadt Germany
New toolkits that parse, analyze, and transform java bytecode are frequently developed from scratch to obtain a representation suitable for a particular purpose. But, while the functionality implemented by these toolk... 详细信息
来源: 评论
Capturing Program Models with BISM  22
Capturing Program Models with BISM
收藏 引用
37th Annual ACM Symposium on Applied Computing
作者: Soueidi, Chukri Falcone, Ylies Univ Grenoble Alpes INRIA CNRS Grenoble INPLIG Grenoble Grenoble France
In this paper, we present an extension of the java bytecode instrumentation tool BISM that captures and prepares a model that abstracts the program behavior at the intra-procedural level. We analyze program methods we... 详细信息
来源: 评论
StoneDetector: Structural and Sub-Clone Detection  17
StoneDetector: Structural and Sub-Clone Detection
收藏 引用
IEEE 17th International Workshop on Software Clones (IWSC)
作者: Schaefer, Andre Amme, Wolfram Heinze, Thomas S. Friedrich Schiller Univ Jena Jena Germany Cooperat Univ Gera Eisenach Gera Germany
The StoneDetector system is an analysis system for finding code clones in java programs using control flow information. In contrast to well-known clone detectors, the StoneDetector system uses a special kind of contro... 详细信息
来源: 评论
Parametric Inference of Memory Requirements for Garbage Collected Languages  10
Parametric Inference of Memory Requirements for Garbage Coll...
收藏 引用
2010 International Symposium on Memory Management
作者: Albert, Elvira Genaim, Samir Gomez-Zamalloa, Miguel Univ Complutense Madrid E-28040 Madrid Spain
The accurate prediction of program's memory requirements is a critical component in software development. Existing heap space analyses either do not take deallocation into account or adopt specific models of garba... 详细信息
来源: 评论
Live Heap Space Analysis for Languages with Garbage Collection  09
Live Heap Space Analysis for Languages with Garbage Collecti...
收藏 引用
International Conference on Memory Management
作者: Albert, Elvira Genaim, Samir Gomez-Zamalloa, Miguel Univ Complutense Madrid E-28040 Madrid Spain
The peak heap consumption of a program is the maximum size of the live data on the heap during the execution of the program, i.e., the minimum amount of heap space needed to run the program without exhausting the memo... 详细信息
来源: 评论