Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Java bytecode.

Dissertationen zum Thema „Java bytecode“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Java bytecode" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Batchelder, Michael Robert. "Java bytecode obfuscation." Thesis, McGill University, 2007. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=18300.

Der volle Inhalt der Quelle
Annotation:
Programs written for machine execution will always be susceptible to information theft. This information can include trademarked algorithms, data embedded in the program, or even data the program accesses. As technology advances computer scientists are building more and more powerful tools for reverse-engineering such as decompilers.The Java programming language is particularly open to reverse-engineering attacks because of its well-defined, open, and portable binary format. We examine one area of better-securing the intellectual property of a Java program; obfuscation. Obfuscation of a progra
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Klein, Gerwin. "Verified Java bytecode verification." [S.l. : s.n.], 2003. http://deposit.ddb.de/cgi-bin/dokserv?idn=967128749.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Shah, Rahul Arvind. "Vulnerability assessment of Java bytecode." Auburn, Ala., 2005. http://repo.lib.auburn.edu/Send%2012-16-07/SHAH_RAHUL_44.pdf.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Ochani, Vidit. "Java bytecode to Pilar translator." Kansas State University, 2013. http://hdl.handle.net/2097/16987.

Der volle Inhalt der Quelle
Annotation:
Master of Science<br>Department of Computing and Information Sciences<br>Robby<br>Software technology is the pivot around which all modern industries revolve. It is not surprising that industries of diverse nature such as finance, business, engineering, medicine, defense, etc. have assimilated sophisticated software in every step of functioning. Subsequently, with larger reach of application, software technology has evolved intricately; thereby thwarting the desirable testing of software. Companies are investing millions of dollars in manual and automated testing, however, software bugs contin
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Doyon, Stéphane. "On the security of Java, the Java bytecode verifier." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0004/MQ41890.pdf.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Vallee-Rai, Raja. "Soot : a java bytecode optimization framework." Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=30836.

Der volle Inhalt der Quelle
Annotation:
Java provides many attractive features such as platform independence, execution safety, garbage collection and object orientation. These features facilitate application development but are expensive to support; applications written in Java are often much slower than their counterparts written in C or C++. To use these features without having to pay a great performance penalty, sophisticated optimizations and runtime systems are required.<br>We present SOOT, a framework for optimizing Java bytecode. The framework is implemented in Java and supports three intermediate representations for represe
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Pinto, Camara Tarcisio. "Otimização bytecode Java na plataforma J2ME." Universidade Federal de Pernambuco, 2004. https://repositorio.ufpe.br/handle/123456789/2567.

Der volle Inhalt der Quelle
Annotation:
Made available in DSpace on 2014-06-12T15:59:18Z (GMT). No. of bitstreams: 2 arquivo5023_1.pdf: 1253051 bytes, checksum: 0bb4a72739c259711e027e24c5f3659f (MD5) license.txt: 1748 bytes, checksum: 8a4605be74aa9ea9d79846c1fba20a33 (MD5) Previous issue date: 2004<br>Conselho Nacional de Desenvolvimento Científico e Tecnológico<br>Aplicações para os dispositivos móveis, como telefones celulares e pagers, implementadas em J2ME (Java 2 Micro Edition) são desenvolvidas sob severas restrições de tamanho e desempenho do código. A indústria tem adotado ferramentas de otimização, como obfuscators e s
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Modesto, Francisco. "Development of a Java Bytecode Front-End." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-6210.

Der volle Inhalt der Quelle
Annotation:
<p>The VizzAnalyzer is a powerful software analysis tool. It is able to extract information from various software representations like source code  but also other specifications like UML. The extracted information is input to static analysis of these software projects. One programming language the VizzAnalyzer can extract information from is Java source code.</p><p>Analyzing the source code is sufficient for most of the analysis. But, sometimes it is necessary to analyze compiled classes either because the program is only available in byte-code, or the scope of analysis includes libraries that
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Zabel, Martin. "Effiziente Mehrkernarchitektur für eingebettete Java-Bytecode-Prozessoren." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2012. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-84156.

Der volle Inhalt der Quelle
Annotation:
Die Java-Plattform bietet viele Vorteile für die schnelle Entwicklung komplexer Software. Für die Ausführung des Java-Bytecodes auf eingebetteten Systemen eignen sich insbesondere Java-(Bytecode)-Prozessoren, die den Java-Bytecode als nativen Befehlssatz unterstützen. Die vorliegende Arbeit untersucht detailliert die Gestaltung einer Mehrkernarchitektur für Java-Prozessoren zur effizienten Nutzung der auf Thread-Ebene ohnehin vorhandenen Parallelität eines Java-Programms. Für die Funktionalitäts- und Leistungsbewertung eines Prototyps wird eine eigene Trace-Architektur eingesetzt. Es wird eine
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Zabel, Martin, and Rainer G. Spallek. "SHAP — Scalable Multi-Core Java Bytecode Processor." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2012. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-97619.

Der volle Inhalt der Quelle
Annotation:
Abstract This paper introduces a new embedded Java multi-core architecture which shows a significantly better performance for a large number of cores than the related projects JopCMP and jamuth IP multi-core. The cores gain fast access to the shared heap by a fullduplex bus with pipelined transactions. Each core is equipped with local on-chip memory for the Java operand stack and the method cache to further reduce the memory bandwidth requirements. As opposed to the related projects, synchronization is supported on a per object-basis instead of a single lock. Load balancing is implemented in J
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Quigley, Claire Louise. "A programming logic for Java bytecode programs." Thesis, University of Glasgow, 2004. http://theses.gla.ac.uk/3030/.

Der volle Inhalt der Quelle
Annotation:
One significant disadvantage of interpreted bytecode languages, such as Java, is their low execution speed in comparison to compiled languages like C. The mobile nature of bytecode adds to the problem, as many checks are necessary to ensure that downloaded code from untrusted sources is rendered as safe as possible. But there do exist ways of speeding up such systems. One approach is to carry out static type checking at load time, as in the case of the Java Bytecode Verifier. This reduces the number of runtime checks that must be done and also allows certain instructions to be replaced by fast
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Zabel, Martin, and Rainer G. Spallek. "SHAP — Scalable Multi-Core Java Bytecode Processor." Technische Universität Dresden, 2009. https://tud.qucosa.de/id/qucosa%3A26171.

Der volle Inhalt der Quelle
Annotation:
Abstract This paper introduces a new embedded Java multi-core architecture which shows a significantly better performance for a large number of cores than the related projects JopCMP and jamuth IP multi-core. The cores gain fast access to the shared heap by a fullduplex bus with pipelined transactions. Each core is equipped with local on-chip memory for the Java operand stack and the method cache to further reduce the memory bandwidth requirements. As opposed to the related projects, synchronization is supported on a per object-basis instead of a single lock. Load balancing is implemented in J
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Žamberský, Zdeněk. "Zpětný překladač jazyka Java." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2015. http://www.nusl.cz/ntk/nusl-232034.

Der volle Inhalt der Quelle
Annotation:
The goal was to create decompiler for Java programing language. Decompiler should reconstruct original Java source code from class files, representing its compiled form. First part of thesis focuses on Java langage, its compilation and structure of class file. Then Java Virtual Machine and its instruction set is discussed. After that thesis focuses on decompilation and algoritms designed and used for decompiler realization. Examples of decompiled code are presented.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Rasi, Stefano. "Manipolazione di Bytecode Java con la libreria ASM." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.

Den vollen Inhalt der Quelle finden
Annotation:
La piattaforma Java è stata introdotta da Sun Microsystem nel 1995 con il motto "write once, run everywhere" (scrivi una volta, esegui ovunque). La macchina virtuale Java o Java Virtual Machine (JVM), insieme al linguaggio omonimo, ha permesso agli sviluppatori di scrivere programmi per dispositivi e sistemi operativi diversi senza dovere modificare il proprio codice, e compilando per tutti questi una sola volta. Questa tecnologia si è rivelata molto utile con la diffusione del web, permettendo l'esecuzione e la condivisione di programmi compilati tra diversi computer in un ottica cross-platf
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Lagerkvist, Mikael Zayenz. "Machine Assisted Reasoning for Multi-Threaded Java Bytecode." Thesis, KTH, Electronic, Computer and Software Systems, ECS, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-9512.

Der volle Inhalt der Quelle
Annotation:
<p>In this thesis an operational semantics for a subset of the Java Virtual Machine (JVM) is developed and presented. The subset contains standard operations such as control flow, computation, and memory management. In addition, the subset contains a treatment of parallel threads of execution.</p><p> </p><p>The operational semantics are embedded into a $µ$-calculus based proof assistant, called the VeriCode Proof Tool (VCPT). VCPT has been developed at the Swedish Institute of Computer Science (SICS), and has powerful features for proving inductive assertions.</p><p> </p><p>Some examples of pr
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

HILLERT, EMILIA. "Obfuscate Java bytecode: an evaluation ofobfuscating transformations using JBCO." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-153909.

Der volle Inhalt der Quelle
Annotation:
Today, software is one of the most complex and intriguing technologies around us. Software development companies must be able to protect their products in order to stay strong against its competitors and against other threats. One solution to this problem is code obfuscation. This master’s thesis investigates how to protect Java source codeagainst reverse engineering. Three obfuscating transformations was successfully implemented and evaluated within a specific obfuscator named JBCO. The conclusion is that in many cases, code obfuscation provides a higher level of obscurity to a program, which
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Mbhambhu, Tsakani Joseph. "A Java bytecode compiler for the 8051 micro-controller." Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/52645.

Der volle Inhalt der Quelle
Annotation:
Thesis (MScEng)--Stellenbosch University, 2002.<br>ENGLISH ABSTRACT: This report describes the development of a Java Bytecode Compiler (JBC) for the 8051 micro-controller. Bytecodes are found in the class file generated when a Java source file is compiled with the java compiler (javac). On Java platforms, the Java Virtual Machine (JVM) interprets and executes the bytecodes. Currently existing Java platforms do not support programming the 8051 using Java. As an 8-bit micro-controller with only 64 KB of total memory, the 8051's word size and memory is too limited to implement a NM. Moreove
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

de, Carvalho Gomes Pedro. "Sound Modular Extraction of Control Flow Graphs from Java Bytecode." Licentiate thesis, KTH, Teoretisk datalogi, TCS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-105275.

Der volle Inhalt der Quelle
Annotation:
Control flow graphs (CFGs) are abstract program models that preserve the control flow information. They have been widely utilized for many static analyses in the past decades. Unfortunately, previous studies about the CFG construction from modern languages, such as Java, have either neglected advanced features that influence the control flow, or do not provide a correctness argument. This is a bearable issue for some program analyses, but not for formal methods, where the soundness of CFGs is a mandatory condition for the verification of safety-critical properties. Moreover, when developing op
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Isber, Elias. "A compiler for all context-free grammars generating Java bytecode." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp04/mq25612.pdf.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Arte, Ashish Sturgill David Brian. "Java bytecode compilation for high-performance, platform-independent logical inference." Waco, Tex. : Baylor University, 2005. http://hdl.handle.net/2104/2887.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Gagnon, Etienne. "A portable research framework for the execution of Java bytecode /." Thesis, McGill University, 2002. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=82876.

Der volle Inhalt der Quelle
Annotation:
Compilation to bytecode paired with interpretation is often used as a technique to easily build prototypes for new programming languages. Some languages, including Java, push this further and use the bytecode layer to isolate programs from the underlying platform. Current state-of-the-art commercial and research Java virtual machines implement advanced just-in-time and adaptive compilation techniques to deliver high-performance execution of Java bytecode. Yet, experimenting with new features such as adding new bytecodes or redesigning the type system can be a daunting task within these
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

de, Carvalho Gomes Pedro, and Attilio Picoco. "Sound Extraction of Control-Flow Graphs from open Java Bytecode Systems." KTH, Teoretisk datalogi, TCS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-104076.

Der volle Inhalt der Quelle
Annotation:
Formal verification techniques have been widely deployed as means to ensure the quality of software products. Unfortunately, they suffer with the combinatorial explosion of the state space. That is, programs have a large number of states, sometimes infinite. A common approach to alleviate the problem is to perform the verification over abstract models from the program. Control-flow graphs (CFG) are one of the most common models, and have been widely studied in the past decades. Unfortunately, previous works over modern programming languages, such as Java, have either neglected features that in
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Urquhart, Luke Dominic Mark. "Worst-case resource-usage analysis of Java Card classic editions application bytecode." Thesis, Imperial College London, 2016. http://hdl.handle.net/10044/1/42538.

Der volle Inhalt der Quelle
Annotation:
Java Card is the dominant smartcard technology in use today, with over 12 billion Java Card smartcards having shipped globally in the last 15 years. Almost exclusively, the deployed Java Card smartcards are instances of a Classic edition for which garbage collection is an optional component in even the most recent Classic edition. Poorly written or malicious Java Card applications may drain the available memory of a Java Card Virtual Machine to the point the card becomes unusable, and undisciplined use of the transaction mechanism may exhaust the available transaction buffers, resulting in pro
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Vittoria, Claude. "Études et principes de conception d'une machine langage Java : le processeur bytecode." Rennes 1, 2008. ftp://ftp.irisa.fr/techreports/theses/2008/vittoria.pdf.

Der volle Inhalt der Quelle
Annotation:
La démocratisation d'Internet facilite aujourd'hui le téléchargement des applications. Mais en contrepartie, le risque de corruption de ces applications à des fins malveillantes peut mettre en péril l'intégrité du système qui les exécute et la sécurité des données. Le langage Java apporte des propriétés telles que la vérification de l'intégrité du code, et la sûreté d'exécution des applications pour palier à ces risques. Nous avons cherché à utiliser le langage Java pour construire une plateforme minimale dédiée à son exécution : le processeur bytecode. Nous avons isolé les éléments manquants
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Charreteur, Florence. "Modélisation par contraintes de programmes en bytecode Java pour la génération automatique de tests." Phd thesis, Université Européenne de Bretagne, 2010. http://tel.archives-ouvertes.fr/tel-00497785.

Der volle Inhalt der Quelle
Annotation:
La vérification des programmes est indispensable pour maintenir un certain niveau de qualité et de fiabilité. Le test est à ce jour le moyen de vérification des logiciels le plus utilisé dans l¤industrie. La programmation par contraintes est vue comme un moyen efficace pour automatiser la génération de données de test. Dans cette thèse nous proposons une modélisation par contraintes de la sémantique du bytecode Java, ainsi qu¤une méthode, basée sur cette modélisation, pour générer automatiquement des données de test. Notre modèle à contraintes de la sémantique d¤un programme en bytecode Java p
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Charreteur, Schadle Florence. "Modélisation par contraintes de programmes en bytecode java pour la génération automatique de tests." Rennes 1, 2010. http://www.theses.fr/2010REN1S019.

Der volle Inhalt der Quelle
Annotation:
La vérification des programmes est indispensable pour maintenir un certain niveau de qualité et de fiabilité. Le test est à ce jour le moyen de vérification des logiciels le plus utilisé dans l’industrie. La programmation par contraintes est vue comme un moyen efficace pour automatiser la génération de données de test. Dans cette thèse nous proposons une modélisation par contraintes de la sémantique du bytecode Java, ainsi qu’une méthode, basée sur cette modélisation, pour générer automatiquement des données de test. Notre modèle à contraintes de la sémantique d’un programme en bytecode Java p
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Hubert, Laurent. "Foundations and implementation of a tool bench for static analysis of Java bytecode programs." Rennes 1, 2010. http://www.theses.fr/2010REN1S122.

Der volle Inhalt der Quelle
Annotation:
In this thesis we study the static analysis of Java bytecode and its semantics foundations. The initialization of an information system is a delicate operation where security properties are enforced and invariants installed. Initialization of fields, objects and classes in Java are difficult operations. These difficulties may lead to security breaches and to bugs, and make the static verification of software more difficult. This thesis proposes static analyses to better master initialization in Java. Hence, we propose a null pointer analysis that finely tracks initialization of fields. It allo
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Žárský, Jan. "Instrumentace Java programů, kontrakty pro paralelismus." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445489.

Der volle Inhalt der Quelle
Annotation:
Contracts for concurrency describe required atomicity of method sequences in concurrent programs. This work proposes a dynamic analyzer to verify programs written in Java against contracts for concurrency. The analyzer was designed to detect violations of parametric contracts with spoilers. The proposed analyzer was implemented as an extension to the RoadRunner framework. Support for accessing the method arguments and return values was added to RoadRunner as a part of the solution. The analyzer was fully implemented and verified on a set of testing programs.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Zabel, Martin [Verfasser], Rainer G. [Akademischer Betreuer] Spallek, and Djamshid [Akademischer Betreuer] Tavangarian. "Effiziente Mehrkernarchitektur für eingebettete Java-Bytecode-Prozessoren / Martin Zabel. Gutachter: Rainer G. Spallek ; Djamshid Tavangarian. Betreuer: Rainer G. Spallek." Dresden : Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2012. http://d-nb.info/1067731520/34.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Rose, Eva. "Vérification de code d'octet de la machine virtuelle Java : formalisation et implantation." Paris 7, 2002. http://www.theses.fr/2002PA077166.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Poncová, Vendula. "Optimalizace velikosti bajtkódu Javy." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-255348.

Der volle Inhalt der Quelle
Annotation:
This paper deals with the Java bytecode size optimization. It describes the Java Virtual Machine and the Java class file format. It also presents some tools for the bytecode manipulation. Using these tools, I have analyzed selected data and found sequences of instructions, that could be optimized. Based on the results of the analysis, I have designed and implemented methods for bytecode size optimization. The bytecode size of the selected data was reduced by roughly 25%.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Mrázek, Petr. "Generický zpětný překlad programů v bajtkódu do vyšší formy reprezentace." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2013. http://www.nusl.cz/ntk/nusl-236178.

Der volle Inhalt der Quelle
Annotation:
The work describes methods and principles of decompilation, basic information about reverse engineering and its use in both software engineering and engineering in general. Furthermore, it introduces the decompiler developed within the Lissom project at BUT FIT. The goal of the work is to design and implement a retargetable decompiler for bytecode, which extends the original decompiler.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Savary, Aymerick. "Détection de vulnérabilités appliquée à la vérification de code intermédiaire de Java Card." Thèse, Université de Sherbrooke, 2016. http://hdl.handle.net/11143/9584.

Der volle Inhalt der Quelle
Annotation:
La vérification de la résistance aux attaques des implémentations embarquées des vérifieurs de code intermédiaire Java Card est une tâche complexe. Les méthodes actuelles n'étant pas suffisamment efficaces, seule la génération de tests manuelle est possible. Pour automatiser ce processus, nous proposons une méthode appelée VTG (Vulnerability Test Generation, génération de tests de vulnérabilité). En se basant sur une représentation formelle des comportements fonctionnels du système sous test, un ensemble de tests d'intrusions est généré. Cette méthode s'inspire des techniques de mutation et de
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Gisel, Daniel. "Eiffel library to generate Java bytecodes." Zürich : ETH, Eidgenössische Technische Hochschule Zürich, Professur für Software Engineering /Chair of Software Engineering, 2003. http://e-collection.ethbib.ethz.ch/show?type=dipl&nr=196.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Mathewson, Nicholas A. (Nicholas Albert) 1977. "Verifying information flow control in Java bytecodes." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86523.

Der volle Inhalt der Quelle
Annotation:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2000.<br>Includes bibliographical references (p. 49).<br>by Nicholas A. Mathewson.<br>M.Eng.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Lima, Willian dos Santos [UNESP]. "Compilação de bytecodes Java para um ambiente de arquitetura reconfigurável." Universidade Estadual Paulista (UNESP), 2009. http://hdl.handle.net/11449/98650.

Der volle Inhalt der Quelle
Annotation:
Made available in DSpace on 2014-06-11T19:29:39Z (GMT). No. of bitstreams: 0 Previous issue date: 2009-02-27Bitstream added on 2014-06-13T20:39:05Z : No. of bitstreams: 1 lima_ws_me_sjrp.pdf: 1076568 bytes, checksum: 2b137d2ad2832d04670f7d9c091eb474 (MD5)<br>Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)<br>Durante esta pesquisa, foram investigados conceitos relacionados à computação reconfigurável, processo de compilação e funcionamento da compilação Java, especialmente no que se refere à manipulação de bytecodes. O principal objetivo é a elaboração conceitual de um co
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Lima, Willian dos Santos. "Compilação de bytecodes Java para um ambiente de arquitetura reconfigurável /." São José do Rio Preto : [s.n.], 2009. http://hdl.handle.net/11449/98650.

Der volle Inhalt der Quelle
Annotation:
Orientador: Renata Spolon Lobato<br>Banca: Eduardo Marques<br>Banca: Aleardo Manacero Junior<br>Resumo: Durante esta pesquisa, foram investigados conceitos relacionados à computação reconfigurável, processo de compilação e funcionamento da compilação Java, especialmente no que se refere à manipulação de bytecodes. O principal objetivo é a elaboração conceitual de um compilador capaz de traduzir bytecodes de um aplicativo Java para código binário obediente ao conjunto de instruções do processador Nios II da Altera®, acompanhada de algumas implementações. Com este compilador, será possível a con
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

"Otimização bytecode Java na plataforma J2ME." Tese, Biblioteca Digital de Teses e Dissertações da UFPE, 2004. http://www.bdtd.ufpe.br/tedeSimplificado//tde_busca/arquivo.php?codArquivo=1319.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Klein, Gerwin [Verfasser]. "Verified Java bytecode verification / Gerwin Klein." 2003. http://d-nb.info/967128749/34.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Wang, Yi-Chieh, and 王繹傑. "Instruction Set Extension for Java Bytecode." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/41889087975284590298.

Der volle Inhalt der Quelle
Annotation:
碩士<br>國立成功大學<br>工程科學系碩博士班<br>97<br>This thesis is to define a subset of Java bytecodes that are suitable for instruction set extension as the basis of CPU executing Java bytecode directly. The first step is to analyze the usage of each Java bytecode from benchmark programs, and then identify the bytecodes suitable for instruction set extension. These experiments are performed on the open-source Java Virtual Machine, the JamVM and GNU Classpath. These experiments collect the usage of Java bytecodes of the DaCapo benchmark suite. We implemented a profiler inside the JVM to help tracing and analy
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Šafařík, Tomáš. "Preprocesor Java bytecode pro verifikační nástroje." Master's thesis, 2016. http://www.nusl.cz/ntk/nusl-347971.

Der volle Inhalt der Quelle
Annotation:
Both J2BP and PANDA tools verify compiled Java programs. By now, these tools are not able to process some programs with specific JVM bytecode instruction sequences in the correct way. We described these instruction sequences and proposed their transformations. We developed the new application, called BytecodeTransformer, based on these propositions. This application transforms compiled Java programs and replaces the problematic instruction sequences with some others. Usage of BytecodeTransformer enlarges the set of programs that can be verified by both J2BP and PANDA. We also evaluated Bytecod
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Tsai, Pao-Chin, and 蔡寶進. "Java Bytecode Obfuscator Using Exception Handling Mechanism." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/62949161489806889919.

Der volle Inhalt der Quelle
Annotation:
碩士<br>國立清華大學<br>資訊工程學系<br>88<br>Recently, mobile computing and enterprise computing are more and more popular over computer networks. In mobile computing, it has become common to distribute mobile programs to the clients at the time when they needed. Because the client platforms are of many types, mobile programs have to be platform-independent. To ensure that, these mobile programs should be in high-level forms and be quite similar to the original source codes. Thus, the common platform-independent codes are easy to be decompiled, and hence they may trap into the risk of malicious reverse eng
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Zabel, Martin. "Effiziente Mehrkernarchitektur für eingebettete Java-Bytecode-Prozessoren." Doctoral thesis, 2011. https://tud.qucosa.de/id/qucosa%3A24907.

Der volle Inhalt der Quelle
Annotation:
Die Java-Plattform bietet viele Vorteile für die schnelle Entwicklung komplexer Software. Für die Ausführung des Java-Bytecodes auf eingebetteten Systemen eignen sich insbesondere Java-(Bytecode)-Prozessoren, die den Java-Bytecode als nativen Befehlssatz unterstützen. Die vorliegende Arbeit untersucht detailliert die Gestaltung einer Mehrkernarchitektur für Java-Prozessoren zur effizienten Nutzung der auf Thread-Ebene ohnehin vorhandenen Parallelität eines Java-Programms. Für die Funktionalitäts- und Leistungsbewertung eines Prototyps wird eine eigene Trace-Architektur eingesetzt. Es wird eine
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Wu, Jian-Zhi, and 吳劍智. "Bytecode Optimizations on Frame Allocations for Java Processors." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/94953313918078119090.

Der volle Inhalt der Quelle
Annotation:
碩士<br>國立清華大學<br>資訊工程學系<br>88<br>In this thesis, we describe two techniques to optimize hardware stack machine performances on Java environments. Our hardware model basically is a Java processor with a fixed-size stack cache, which directly implements the method frame activation allocations of a software Java virtual machine (JVM). In the first category, we present a technique to solve the problem about the stack allocations for intra-procedural methods in the Java processor. We put emphasis on the issue with the local variable allocation of the method frame. A structure or object unfolding tec
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Kumar, Ranjan. "Analysis of Java Programs Using Bytecode Based Frameworks." Thesis, 2015. http://ethesis.nitrkl.ac.in/7645/1/98.pdf.

Der volle Inhalt der Quelle
Annotation:
Java SDG(System dependence Graph) API and JOANA (Java Object-sensitive Analysis) are two bytecode based analysis frameworks available for analyzing object oriented java programs for different applications. In the present era, the continuous evolution of the customer expectations and requirements has resulted in the increase of size of the software. This arises the problems in maintaining software. Both the frameworks i.e Java SDG API and Joana consist of different variety of analysis techniques which are based on dependence graph generation and computation of slices of an input program. In our
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Chen, Chien-Chung, and 陳建忠. "Instruction Level Parallelism Analysis of Java Bytecode with Folding." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/46868680981727304642.

Der volle Inhalt der Quelle
Annotation:
碩士<br>國立交通大學<br>資訊工程學系<br>86<br>The performance of a stack machine is limited mainly by sequential stackacceses. A performance enhancement mechanism - Stack Operations Folding -was used in Sun Microelectronics' picoJava design. There are another twofolding techniques: fixed- pattern folding and POC model beyond Sun'.In thisthesis, we use the Java bytecode language as the target machine language, analyze the factors affecting ILP, and extract parallelism among bytecodesafter folding using PO
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Chen, Hsiang-Yang, and 陳湘揚. "Control Flow Obfuscation and Protection of Java Bytecode Programs." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/13096136575698138666.

Der volle Inhalt der Quelle
Annotation:
博士<br>國立成功大學<br>工程科學系碩博士班<br>97<br>Software piracy is the unauthorized copying or distribution of copyrighted software. The money loss for software piracy is still very high in this world now. Software protection is used to against software piracy. Software protection techniques disable part or all the functions of a program upon detecting any unwanted modifications. There are many software protection techniques, such as obfuscation, tamper-proofing, software watermarking, cryptography, etc. Java programs can be easily decompiled and reverse engineered from Java bytecode to Java source code by
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

TANG, CHING HUI, and 鄭秦輝. "The Study and Implementation of the Java Bytecode Compiler." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/67329828531522416740.

Der volle Inhalt der Quelle
Annotation:
碩士<br>國立清華大學<br>資訊工程學系<br>86<br>Java虛擬機器(virtual machine)是由昇陽公司提出的一種支援Java程式 語言的執行環境,具有嚴格安全檢查,跨平台支援等優點。當時昇陽公司 以Java語言發展HotJava WWW Browser來展示Java程式和Applet,結果在 網際網路(Internet)上造成一股流行風潮,加上後來各個公司的WWW Browser都納入Java虛擬機器,因而將Java系統推上了流行的高峰。雖然 Java程式語言本身具有很多的優點,但Java虛擬機器的執行速度過慢,無 法做為大量科學計算,大架構(large-scale)程式,及發展embedding系統 等等的平台。昇陽公司為了解決這個問題,同時採取幾種方法,包括使用 硬體來加速位元組碼的執行,如執行Java Bytecode的CPU(picoJava)及軟 體上更進,如即時編譯(JIT)等技巧。在本論文中,我們研究與實作Java 位元組碼(bytecode)的靜態
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Gopinadhan, Gautam V. S. "Architecture for using Java bytecode for processing Digital Items." 2003. http://www.lib.ncsu.edu/theses/available/etd-12182003-061448/unrestricted/etd.pdf.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Lin, You-Chen, and 林祐辰. "Implementation of Java 8-compliant InvokeDynamic Bytecode for CVM." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/5g5md9.

Der volle Inhalt der Quelle
Annotation:
碩士<br>國立交通大學<br>資訊科學與工程研究所<br>107<br>CVM (the J2ME/CDC JIT-capable VM) is a Java virtual machine released by Sun Microsystems for connected devices. Compare with other JVMs, CVM has some features that are suitable for embedded systems, such as, smaller code size, a high performance Just-in-time compiler, and a small 126-class core library for minimal Java application execution. Most importantly, it has been ported to the largest number of different CPU architecture. However, the open-source version of CVM only supports Java 2 Micro Edition (J2ME). After the acquisition of Sun by Oracle, they s
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!