Journal articles on the topic 'Java bytecode'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Java bytecode.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Gal, Andreas, Christian W. Probst, and Michael Franz. "Integrated Java Bytecode Verification." Electronic Notes in Theoretical Computer Science 131 (May 2005): 27–38. http://dx.doi.org/10.1016/j.entcs.2005.01.020.
Full textKim, Ki-Tae, Je-Min Kim, and Weon-Hee Yoo. "Implementation of Java Bytecode Framework." Journal of the Korea Contents Association 10, no. 3 (March 28, 2010): 122–31. http://dx.doi.org/10.5392/jkca.2010.10.3.122.
Full textReynolds, Mark C. "Modeling the Java Bytecode Verifier." Science of Computer Programming 78, no. 3 (March 2013): 327–42. http://dx.doi.org/10.1016/j.scico.2011.03.008.
Full textBertelsen, Peter. "Dynamic semantics of Java bytecode." Future Generation Computer Systems 16, no. 7 (May 2000): 841–50. http://dx.doi.org/10.1016/s0167-739x(99)00094-1.
Full textCook, J. J. "Reverse Execution of Java Bytecode." Computer Journal 45, no. 6 (June 1, 2002): 608–19. http://dx.doi.org/10.1093/comjnl/45.6.608.
Full textZhao, Jian-jun. "Static analysis of Java bytecode." Wuhan University Journal of Natural Sciences 6, no. 1-2 (March 2001): 383–90. http://dx.doi.org/10.1007/bf03160273.
Full textDobravec, Tomaž. "JAVA BYTECODE INSTRUCTION USAGE COUNTING WITH ALGATOR." Acta Electrotechnica et Informatica 18, no. 4 (January 5, 2018): 17–25. http://dx.doi.org/10.15546/aeei-2018-0028.
Full textWang, Tao, and Abhik Roychoudhury. "Dynamic slicing on Java bytecode traces." ACM Transactions on Programming Languages and Systems 30, no. 2 (March 2008): 1–49. http://dx.doi.org/10.1145/1330017.1330021.
Full textChan, Jien-Tsai, and Wuu Yang. "Advanced obfuscation techniques for Java bytecode." Journal of Systems and Software 71, no. 1-2 (April 2004): 1–10. http://dx.doi.org/10.1016/s0164-1212(02)00066-3.
Full textGhosh, Sudipto, and John L. Kelly. "Bytecode fault injection for Java software." Journal of Systems and Software 81, no. 11 (November 2008): 2034–43. http://dx.doi.org/10.1016/j.jss.2008.02.047.
Full textChrząszcz, Jacek, Patryk Czarnik, and Aleksy Schubert. "A Dozen Instructions Make Java Bytecode." Electronic Notes in Theoretical Computer Science 264, no. 4 (February 2011): 19–34. http://dx.doi.org/10.1016/j.entcs.2011.02.003.
Full textEichberg, Michael. "BAT2XML: XML-based Java Bytecode Representation." Electronic Notes in Theoretical Computer Science 141, no. 1 (December 2005): 93–107. http://dx.doi.org/10.1016/j.entcs.2005.02.035.
Full textLeroy, Xavier. "Bytecode verification on Java smart cards." Software: Practice and Experience 32, no. 4 (2002): 319–40. http://dx.doi.org/10.1002/spe.438.
Full textLi, Zhiming, Qing Wu, and Kun Qian. "Adabot: Fault-Tolerant Java Decompiler (Student Abstract)." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 10 (April 3, 2020): 13861–62. http://dx.doi.org/10.1609/aaai.v34i10.7203.
Full textJiang, Long Long, and Dai Ping Li. "Using Contour Marking Bytecode Verification Algorithm on the Java Card." Applied Mechanics and Materials 556-562 (May 2014): 4120–23. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.4120.
Full textOgata, Kazunori, Hideaki Komatsu, and Toshio Nakatani. "Bytecode fetch optimization for a Java interpreter." ACM SIGARCH Computer Architecture News 30, no. 5 (December 2002): 58–67. http://dx.doi.org/10.1145/635506.605404.
Full textOgata, Kazunori, Hideaki Komatsu, and Toshio Nakatani. "Bytecode fetch optimization for a Java interpreter." ACM SIGOPS Operating Systems Review 36, no. 5 (December 2002): 58–67. http://dx.doi.org/10.1145/635508.605404.
Full textMunsil, Wes, and Chia-Jiu Wang. "Reducing stack usage in Java bytecode execution." ACM SIGARCH Computer Architecture News 26, no. 1 (March 1998): 7–11. http://dx.doi.org/10.1145/1216461.1216464.
Full textQian, Zhenyu. "Standard fixpoint iteration for Java bytecode verification." ACM Transactions on Programming Languages and Systems 22, no. 4 (July 2000): 638–72. http://dx.doi.org/10.1145/363911.363915.
Full textDoyon, S., and M. Debbabi. "On object initialization in the Java bytecode." Computer Communications 23, no. 17 (November 2000): 1594–605. http://dx.doi.org/10.1016/s0140-3664(00)00245-0.
Full textOgata, Kazunori, Hideaki Komatsu, and Toshio Nakatani. "Bytecode fetch optimization for a Java interpreter." ACM SIGPLAN Notices 37, no. 10 (October 2002): 58–67. http://dx.doi.org/10.1145/605432.605404.
Full textAvvenuti, Marco, Cinzia Bernardeschi, and Nicoletta De Francesco. "Java bytecode verification for secure information flow." ACM SIGPLAN Notices 38, no. 12 (December 2003): 20–27. http://dx.doi.org/10.1145/966051.966055.
Full textStata, Raymie, and Martin Abadi. "A type system for Java bytecode subroutines." ACM Transactions on Programming Languages and Systems 21, no. 1 (January 1999): 90–137. http://dx.doi.org/10.1145/314602.314606.
Full textAlbert, E., P. Arenas, S. Genaim, G. Puebla, and D. Zanardini. "Experiments in Cost Analysis of Java Bytecode." Electronic Notes in Theoretical Computer Science 190, no. 1 (July 2007): 67–83. http://dx.doi.org/10.1016/j.entcs.2007.02.061.
Full textVincenzi, A. M. R., M. E. Delamaro, J. C. Maldonado, and W. E. Wong. "Establishing structural testing criteria for Java bytecode." Software: Practice and Experience 36, no. 14 (2006): 1513–41. http://dx.doi.org/10.1002/spe.726.
Full textCollberg, Christian, Ginger Myles, and Michael Stepp. "An empirical study of Java bytecode programs." Software: Practice and Experience 37, no. 6 (2007): 581–641. http://dx.doi.org/10.1002/spe.776.
Full textMeehan, Gary, and Mike Joy. "Compiling lazy functional programs to Java bytecode." Software: Practice and Experience 29, no. 7 (June 1999): 617–45. http://dx.doi.org/10.1002/(sici)1097-024x(199906)29:7<617::aid-spe250>3.0.co;2-e.
Full textSherman, Elena, Yannic Noller, Cyrille Artho, Franck van Breugel, Anto Nanah Ji, John Kellerman, Parssa Khazra, et al. "The Java Pathfinder Workshop 2022." ACM SIGSOFT Software Engineering Notes 48, no. 1 (January 10, 2023): 19–21. http://dx.doi.org/10.1145/3573074.3573080.
Full textBernardeschi, C., N. De Francesco, G. Lettieri, and L. Martini. "Checking secure information flow in Java bytecode by code transformation and standard bytecode verification." Software: Practice and Experience 34, no. 13 (October 18, 2004): 1225–55. http://dx.doi.org/10.1002/spe.611.
Full textHaase, Oliver. "Abstract Interpretation of Java Bytecode for Immutability Analysis." Journal of Computer Science 12, no. 7 (July 1, 2016): 314–22. http://dx.doi.org/10.3844/jcssp.2016.314.322.
Full textClausen, Lars Ræder, Ulrik Pagh Schultz, Charles Consel, and Gilles Muller. "Java bytecode compression for low-end embedded systems." ACM Transactions on Programming Languages and Systems 22, no. 3 (May 2000): 471–89. http://dx.doi.org/10.1145/353926.353933.
Full textJipping, Michael J., Cameron Calka, Brian O'Neill, and Christopher R. Padilla. "Teaching students java bytecode using lego mindstorms robots." ACM SIGCSE Bulletin 39, no. 1 (March 7, 2007): 170–74. http://dx.doi.org/10.1145/1227504.1227371.
Full textGal, Andreas, Christian W. Probst, and Michael Franz. "Java bytecode verification via static single assignment form." ACM Transactions on Programming Languages and Systems 30, no. 4 (July 2008): 1–21. http://dx.doi.org/10.1145/1377492.1377496.
Full textBARTHE, GILLES, DAVID PICHARDIE, and TAMARA REZK. "A certified lightweight non-interference Java bytecode verifier." Mathematical Structures in Computer Science 23, no. 5 (May 17, 2013): 1032–81. http://dx.doi.org/10.1017/s0960129512000850.
Full textPayet, Étienne, and Fausto Spoto. "Experiments with Non-Termination Analysis for Java Bytecode." Electronic Notes in Theoretical Computer Science 253, no. 5 (December 2009): 83–96. http://dx.doi.org/10.1016/j.entcs.2009.11.016.
Full textSpoto, Fausto, and Étienne Payet. "Magic-sets for localised analysis of Java bytecode." Higher-Order and Symbolic Computation 23, no. 1 (March 2010): 29–86. http://dx.doi.org/10.1007/s10990-010-9063-7.
Full textMcGhan, H., and M. O'Connor. "PicoJava: a direct execution engine for Java bytecode." Computer 31, no. 10 (1998): 22–30. http://dx.doi.org/10.1109/2.722273.
Full textKnoblock, Todd B., and Jakob Rehof. "Type elaboration and subtype completion for Java bytecode." ACM Transactions on Programming Languages and Systems 23, no. 2 (March 2001): 243–72. http://dx.doi.org/10.1145/383043.383045.
Full textClausen, Lars R. "A Java bytecode optimizer using side-effect analysis." Concurrency: Practice and Experience 9, no. 11 (November 1997): 1031–45. http://dx.doi.org/10.1002/(sici)1096-9128(199711)9:11<1031::aid-cpe354>3.0.co;2-o.
Full textBernardeschi, Cinzia, Giuseppe Lettieri, Luca Martini, and Paolo Masci. "A Space-Aware Bytecode Verifier for Java Cards." Electronic Notes in Theoretical Computer Science 141, no. 1 (December 2005): 237–54. http://dx.doi.org/10.1016/j.entcs.2005.02.027.
Full textBinder, Walter, and Jarle Hulaas. "Java Bytecode Transformations for Efficient, Portable CPU Accounting." Electronic Notes in Theoretical Computer Science 141, no. 1 (December 2005): 53–73. http://dx.doi.org/10.1016/j.entcs.2005.02.037.
Full textCoglio, Alessandro. "Improving the official specification of Java bytecode verification." Concurrency and Computation: Practice and Experience 15, no. 2 (2003): 155–79. http://dx.doi.org/10.1002/cpe.714.
Full textCoglio, Alessandro. "Simple verification technique for complex Java bytecode subroutines." Concurrency and Computation: Practice and Experience 16, no. 7 (April 27, 2004): 647–70. http://dx.doi.org/10.1002/cpe.798.
Full textLambert, Jonathan, Rosemary Monahan, and Kevin Casey. "Accidental Choices—How JVM Choice and Associated Build Tools Affect Interpreter Performance." Computers 11, no. 6 (June 14, 2022): 96. http://dx.doi.org/10.3390/computers11060096.
Full textVartanov, S. P., and M. K. Ermakov. "Applying Java bytecode static instrumentation for software dynamic analysis." Proceedings of the Institute for System Programming of the RAS 27, no. 1 (2015): 25–38. http://dx.doi.org/10.15514/ispras-2015-27(1)-2.
Full textGAMESS, ERIC. "EXECUTION OF SEQUENTIAL AND PARALLEL JAVA BYTECODE IN A METACOMPUTING SYSTEM." Parallel Processing Letters 13, no. 01 (March 2003): 53–64. http://dx.doi.org/10.1142/s0129626403001148.
Full textPapadimitriou, Stergios, Seferina Mavroudi, Kostas Theofilatos, and Spiridon Likothanasis. "MATLAB-Like Scripting of Java Scientific Libraries in ScalaLab." Scientific Programming 22, no. 3 (2014): 187–99. http://dx.doi.org/10.1155/2014/570902.
Full textBockisch, Christoph, Gabriele Taentzer, Nebras Nassar, and Lukas Wydra. "Java Bytecode Verification with OCL Why, How and Whenc." Journal of Object Technology 19, no. 3 (2020): 3:1. http://dx.doi.org/10.5381/jot.2020.19.3.a13.
Full textAchour, Safaa, Ali Chouenyib, and Mohammed Benattou. "A Constraint-Based Verification Approach for Java Bytecode Programs." International Journal of Software Engineering and Its Applications 12, no. 2 (June 30, 2018): 1–17. http://dx.doi.org/10.14257/ijseia.2018.12.2.01.
Full textKumar, Krishan, Viney Kehar, and Prabhpreet Kaur. "An Evaluation of Dynamic Java Bytecode Software Watermarking Algorithms." International Journal of Security and Its Applications 10, no. 7 (July 31, 2016): 147–56. http://dx.doi.org/10.14257/ijsia.2016.10.7.13.
Full text