To see the other types of publications on this topic, follow the link: Java bytecode.

Journal articles on the topic 'Java bytecode'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Java bytecode.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Gal, Andreas, Christian W. Probst, and Michael Franz. "Integrated Java Bytecode Verification." Electronic Notes in Theoretical Computer Science 131 (May 2005): 27–38. http://dx.doi.org/10.1016/j.entcs.2005.01.020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kim, Ki-Tae, Je-Min Kim, and Weon-Hee Yoo. "Implementation of Java Bytecode Framework." Journal of the Korea Contents Association 10, no. 3 (March 28, 2010): 122–31. http://dx.doi.org/10.5392/jkca.2010.10.3.122.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Reynolds, Mark C. "Modeling the Java Bytecode Verifier." Science of Computer Programming 78, no. 3 (March 2013): 327–42. http://dx.doi.org/10.1016/j.scico.2011.03.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bertelsen, Peter. "Dynamic semantics of Java bytecode." Future Generation Computer Systems 16, no. 7 (May 2000): 841–50. http://dx.doi.org/10.1016/s0167-739x(99)00094-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cook, J. J. "Reverse Execution of Java Bytecode." Computer Journal 45, no. 6 (June 1, 2002): 608–19. http://dx.doi.org/10.1093/comjnl/45.6.608.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhao, Jian-jun. "Static analysis of Java bytecode." Wuhan University Journal of Natural Sciences 6, no. 1-2 (March 2001): 383–90. http://dx.doi.org/10.1007/bf03160273.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dobravec, Tomaž. "JAVA BYTECODE INSTRUCTION USAGE COUNTING WITH ALGATOR." Acta Electrotechnica et Informatica 18, no. 4 (January 5, 2018): 17–25. http://dx.doi.org/10.15546/aeei-2018-0028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Tao, and Abhik Roychoudhury. "Dynamic slicing on Java bytecode traces." ACM Transactions on Programming Languages and Systems 30, no. 2 (March 2008): 1–49. http://dx.doi.org/10.1145/1330017.1330021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chan, Jien-Tsai, and Wuu Yang. "Advanced obfuscation techniques for Java bytecode." Journal of Systems and Software 71, no. 1-2 (April 2004): 1–10. http://dx.doi.org/10.1016/s0164-1212(02)00066-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ghosh, Sudipto, and John L. Kelly. "Bytecode fault injection for Java software." Journal of Systems and Software 81, no. 11 (November 2008): 2034–43. http://dx.doi.org/10.1016/j.jss.2008.02.047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Chrząszcz, Jacek, Patryk Czarnik, and Aleksy Schubert. "A Dozen Instructions Make Java Bytecode." Electronic Notes in Theoretical Computer Science 264, no. 4 (February 2011): 19–34. http://dx.doi.org/10.1016/j.entcs.2011.02.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Eichberg, Michael. "BAT2XML: XML-based Java Bytecode Representation." Electronic Notes in Theoretical Computer Science 141, no. 1 (December 2005): 93–107. http://dx.doi.org/10.1016/j.entcs.2005.02.035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Leroy, Xavier. "Bytecode verification on Java smart cards." Software: Practice and Experience 32, no. 4 (2002): 319–40. http://dx.doi.org/10.1002/spe.438.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Li, Zhiming, Qing Wu, and Kun Qian. "Adabot: Fault-Tolerant Java Decompiler (Student Abstract)." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 10 (April 3, 2020): 13861–62. http://dx.doi.org/10.1609/aaai.v34i10.7203.

Full text
Abstract:
Reverse Engineering has been an extremely important field in software engineering, it helps us to better understand and analyze the internal architecture and interrealtions of executables. Classical Java reverse engineering task includes disassembly and decompilation. Traditional Abstract Syntax Tree (AST) based disassemblers and decompilers are strictly rule defined and thus highly fault intolerant when bytecode obfuscation were introduced for safety concern. In this work, we view decompilation as a statistical machine translation task and propose a decompilation framework which is fully based on self-attention mechanism. Through better adaption to the linguistic uniqueness of bytecode, our model fully outperforms rule-based models and previous works based on recurrence mechanism.
APA, Harvard, Vancouver, ISO, and other styles
15

Jiang, Long Long, and Dai Ping Li. "Using Contour Marking Bytecode Verification Algorithm on the Java Card." Applied Mechanics and Materials 556-562 (May 2014): 4120–23. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.4120.

Full text
Abstract:
Java bytecode verification could not be well performed in the smart card due to the resource usage especially in the resource-constrained devices. Currently, on the card there are several bytecode verifications which exist kinds of problems, in order to be better and be better adapt to the environment, such as a smart card platform, raised using the contour subroutine labeled bytecode verification algorithm on a card. First, through the analysis of existing card byte code verification algorithm to determine the imperfections and difficulties in the judgment and the verification of subroutine, and then propose a method for marking the subroutine in the place of the jump to it. Thus not only get the program structure and enhance the effectiveness and efficiency of the validation. The feasibility of the method is demonstrated by simulating typical examples verification.
APA, Harvard, Vancouver, ISO, and other styles
16

Ogata, Kazunori, Hideaki Komatsu, and Toshio Nakatani. "Bytecode fetch optimization for a Java interpreter." ACM SIGARCH Computer Architecture News 30, no. 5 (December 2002): 58–67. http://dx.doi.org/10.1145/635506.605404.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Ogata, Kazunori, Hideaki Komatsu, and Toshio Nakatani. "Bytecode fetch optimization for a Java interpreter." ACM SIGOPS Operating Systems Review 36, no. 5 (December 2002): 58–67. http://dx.doi.org/10.1145/635508.605404.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Munsil, Wes, and Chia-Jiu Wang. "Reducing stack usage in Java bytecode execution." ACM SIGARCH Computer Architecture News 26, no. 1 (March 1998): 7–11. http://dx.doi.org/10.1145/1216461.1216464.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Qian, Zhenyu. "Standard fixpoint iteration for Java bytecode verification." ACM Transactions on Programming Languages and Systems 22, no. 4 (July 2000): 638–72. http://dx.doi.org/10.1145/363911.363915.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Doyon, S., and M. Debbabi. "On object initialization in the Java bytecode." Computer Communications 23, no. 17 (November 2000): 1594–605. http://dx.doi.org/10.1016/s0140-3664(00)00245-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Ogata, Kazunori, Hideaki Komatsu, and Toshio Nakatani. "Bytecode fetch optimization for a Java interpreter." ACM SIGPLAN Notices 37, no. 10 (October 2002): 58–67. http://dx.doi.org/10.1145/605432.605404.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Avvenuti, Marco, Cinzia Bernardeschi, and Nicoletta De Francesco. "Java bytecode verification for secure information flow." ACM SIGPLAN Notices 38, no. 12 (December 2003): 20–27. http://dx.doi.org/10.1145/966051.966055.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Stata, Raymie, and Martin Abadi. "A type system for Java bytecode subroutines." ACM Transactions on Programming Languages and Systems 21, no. 1 (January 1999): 90–137. http://dx.doi.org/10.1145/314602.314606.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Albert, E., P. Arenas, S. Genaim, G. Puebla, and D. Zanardini. "Experiments in Cost Analysis of Java Bytecode." Electronic Notes in Theoretical Computer Science 190, no. 1 (July 2007): 67–83. http://dx.doi.org/10.1016/j.entcs.2007.02.061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Vincenzi, A. M. R., M. E. Delamaro, J. C. Maldonado, and W. E. Wong. "Establishing structural testing criteria for Java bytecode." Software: Practice and Experience 36, no. 14 (2006): 1513–41. http://dx.doi.org/10.1002/spe.726.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Collberg, Christian, Ginger Myles, and Michael Stepp. "An empirical study of Java bytecode programs." Software: Practice and Experience 37, no. 6 (2007): 581–641. http://dx.doi.org/10.1002/spe.776.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Meehan, Gary, and Mike Joy. "Compiling lazy functional programs to Java bytecode." Software: Practice and Experience 29, no. 7 (June 1999): 617–45. http://dx.doi.org/10.1002/(sici)1097-024x(199906)29:7<617::aid-spe250>3.0.co;2-e.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Sherman, Elena, Yannic Noller, Cyrille Artho, Franck van Breugel, Anto Nanah Ji, John Kellerman, Parssa Khazra, et al. "The Java Pathfinder Workshop 2022." ACM SIGSOFT Software Engineering Notes 48, no. 1 (January 10, 2023): 19–21. http://dx.doi.org/10.1145/3573074.3573080.

Full text
Abstract:
Java Pathfinder (JPF) was originally developed as an explicit state software model checker and subsequently evolved into an extensible Java bytecode analysis framework that has been successfully used to implement techniques such as symbolic and concolic execution, compositional verification, parallel execution, incremental program analysis, and many more. Apart from its original domain of concurrent Java programs, JPF now supports the verification of new domains such as UMLs, numeric programs, graphical user interfaces, and Android applications.
APA, Harvard, Vancouver, ISO, and other styles
29

Bernardeschi, C., N. De Francesco, G. Lettieri, and L. Martini. "Checking secure information flow in Java bytecode by code transformation and standard bytecode verification." Software: Practice and Experience 34, no. 13 (October 18, 2004): 1225–55. http://dx.doi.org/10.1002/spe.611.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Haase, Oliver. "Abstract Interpretation of Java Bytecode for Immutability Analysis." Journal of Computer Science 12, no. 7 (July 1, 2016): 314–22. http://dx.doi.org/10.3844/jcssp.2016.314.322.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Clausen, Lars Ræder, Ulrik Pagh Schultz, Charles Consel, and Gilles Muller. "Java bytecode compression for low-end embedded systems." ACM Transactions on Programming Languages and Systems 22, no. 3 (May 2000): 471–89. http://dx.doi.org/10.1145/353926.353933.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Jipping, Michael J., Cameron Calka, Brian O'Neill, and Christopher R. Padilla. "Teaching students java bytecode using lego mindstorms robots." ACM SIGCSE Bulletin 39, no. 1 (March 7, 2007): 170–74. http://dx.doi.org/10.1145/1227504.1227371.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Gal, Andreas, Christian W. Probst, and Michael Franz. "Java bytecode verification via static single assignment form." ACM Transactions on Programming Languages and Systems 30, no. 4 (July 2008): 1–21. http://dx.doi.org/10.1145/1377492.1377496.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

BARTHE, GILLES, DAVID PICHARDIE, and TAMARA REZK. "A certified lightweight non-interference Java bytecode verifier." Mathematical Structures in Computer Science 23, no. 5 (May 17, 2013): 1032–81. http://dx.doi.org/10.1017/s0960129512000850.

Full text
Abstract:
Non-interference guarantees the absence of illicit information flow throughout program execution. It can be enforced by appropriate information flow type systems. Much of the previous work on type systems for non-interference has focused on calculi or high-level programming languages, and existing type systems for low-level languages typically omit objects, exceptions and method calls. We define an information flow type system for a sequential JVM-like language that includes all these programming features, and we prove, in the Coq proof assistant, that it guarantees non-interference. An additional benefit of the formalisation is that we have extracted from our proof a certified lightweight bytecode verifier for information flow. Our work provides, to the best of our knowledge, the first sound and certified information flow type system for such an expressive fragment of the JVM.
APA, Harvard, Vancouver, ISO, and other styles
35

Payet, Étienne, and Fausto Spoto. "Experiments with Non-Termination Analysis for Java Bytecode." Electronic Notes in Theoretical Computer Science 253, no. 5 (December 2009): 83–96. http://dx.doi.org/10.1016/j.entcs.2009.11.016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Spoto, Fausto, and Étienne Payet. "Magic-sets for localised analysis of Java bytecode." Higher-Order and Symbolic Computation 23, no. 1 (March 2010): 29–86. http://dx.doi.org/10.1007/s10990-010-9063-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

McGhan, H., and M. O'Connor. "PicoJava: a direct execution engine for Java bytecode." Computer 31, no. 10 (1998): 22–30. http://dx.doi.org/10.1109/2.722273.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Knoblock, Todd B., and Jakob Rehof. "Type elaboration and subtype completion for Java bytecode." ACM Transactions on Programming Languages and Systems 23, no. 2 (March 2001): 243–72. http://dx.doi.org/10.1145/383043.383045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Clausen, Lars R. "A Java bytecode optimizer using side-effect analysis." Concurrency: Practice and Experience 9, no. 11 (November 1997): 1031–45. http://dx.doi.org/10.1002/(sici)1096-9128(199711)9:11<1031::aid-cpe354>3.0.co;2-o.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Bernardeschi, Cinzia, Giuseppe Lettieri, Luca Martini, and Paolo Masci. "A Space-Aware Bytecode Verifier for Java Cards." Electronic Notes in Theoretical Computer Science 141, no. 1 (December 2005): 237–54. http://dx.doi.org/10.1016/j.entcs.2005.02.027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Binder, Walter, and Jarle Hulaas. "Java Bytecode Transformations for Efficient, Portable CPU Accounting." Electronic Notes in Theoretical Computer Science 141, no. 1 (December 2005): 53–73. http://dx.doi.org/10.1016/j.entcs.2005.02.037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Coglio, Alessandro. "Improving the official specification of Java bytecode verification." Concurrency and Computation: Practice and Experience 15, no. 2 (2003): 155–79. http://dx.doi.org/10.1002/cpe.714.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Coglio, Alessandro. "Simple verification technique for complex Java bytecode subroutines." Concurrency and Computation: Practice and Experience 16, no. 7 (April 27, 2004): 647–70. http://dx.doi.org/10.1002/cpe.798.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Lambert, Jonathan, Rosemary Monahan, and Kevin Casey. "Accidental Choices—How JVM Choice and Associated Build Tools Affect Interpreter Performance." Computers 11, no. 6 (June 14, 2022): 96. http://dx.doi.org/10.3390/computers11060096.

Full text
Abstract:
Considering the large number of optimisation techniques that have been integrated into the design of the Java Virtual Machine (JVM) over the last three decades, the Java interpreter continues to persist as a significant bottleneck in the performance of bytecode execution. This paper examines the relationship between Java Runtime Environment (JRE) performance concerning the interpreted execution of Java bytecode and the effect modern compiler selection and integration within the JRE build toolchain has on that performance. We undertook this evaluation relative to a contemporary benchmark suite of application workloads, the Renaissance Benchmark Suite. Our results show that the choice of GNU GCC compiler version used within the JRE build toolchain statistically significantly affects runtime performance. More importantly, not all OpenJDK releases and JRE JVM interpreters are equal. Our results show that OpenJDK JVM interpreter performance is associated with benchmark workload. In addition, in some cases, rolling back to an earlier OpenJDK version and using a more recent GNU GCC compiler within the build toolchain of the JRE can significantly positively impact JRE performance.
APA, Harvard, Vancouver, ISO, and other styles
45

Vartanov, S. P., and M. K. Ermakov. "Applying Java bytecode static instrumentation for software dynamic analysis." Proceedings of the Institute for System Programming of the RAS 27, no. 1 (2015): 25–38. http://dx.doi.org/10.15514/ispras-2015-27(1)-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

GAMESS, ERIC. "EXECUTION OF SEQUENTIAL AND PARALLEL JAVA BYTECODE IN A METACOMPUTING SYSTEM." Parallel Processing Letters 13, no. 01 (March 2003): 53–64. http://dx.doi.org/10.1142/s0129626403001148.

Full text
Abstract:
In this paper, we address the goal of executing Java parallel applications in a group of nodes of a Beowulf cluster transparently chosen by a metacomputing system oriented to efficient execution of Java bytecode, with support for scientific computing. To this end, we extend the Java virtual machine by providing a message passing interface and quick access to distributed high performance resources. Also, we introduce the execution of parallel linear algebra methods for large objects from sequential Java applications by invoking SPLAM, our parallel linear algebra package.
APA, Harvard, Vancouver, ISO, and other styles
47

Papadimitriou, Stergios, Seferina Mavroudi, Kostas Theofilatos, and Spiridon Likothanasis. "MATLAB-Like Scripting of Java Scientific Libraries in ScalaLab." Scientific Programming 22, no. 3 (2014): 187–99. http://dx.doi.org/10.1155/2014/570902.

Full text
Abstract:
Although there are a lot of robust and effective scientific libraries in Java, the utilization of these libraries in pure Java is difficult and cumbersome, especially for the average scientist that does not expertise in software development. We illustrate that ScalaLab presents an easier and productive MATLAB like front end. Also, the main strengths and weaknesses of the core Java libraries of ScalaLab are elaborated. Since performance is of paramount importance for scientific computation, the article discusses extensively performance aspects of the ScalaLab environment. Also, Java bytecode performance is compared to native code.
APA, Harvard, Vancouver, ISO, and other styles
48

Bockisch, Christoph, Gabriele Taentzer, Nebras Nassar, and Lukas Wydra. "Java Bytecode Verification with OCL Why, How and Whenc." Journal of Object Technology 19, no. 3 (2020): 3:1. http://dx.doi.org/10.5381/jot.2020.19.3.a13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Achour, Safaa, Ali Chouenyib, and Mohammed Benattou. "A Constraint-Based Verification Approach for Java Bytecode Programs." International Journal of Software Engineering and Its Applications 12, no. 2 (June 30, 2018): 1–17. http://dx.doi.org/10.14257/ijseia.2018.12.2.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Kumar, Krishan, Viney Kehar, and Prabhpreet Kaur. "An Evaluation of Dynamic Java Bytecode Software Watermarking Algorithms." International Journal of Security and Its Applications 10, no. 7 (July 31, 2016): 147–56. http://dx.doi.org/10.14257/ijsia.2016.10.7.13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography