Results 51 to 60 of about 1,204,944 (369)
Deadlock detection of Java Bytecode
This paper presents a technique for deadlock detection of Java programs. The technique uses typing rules for extracting infinite-state abstract models of the dependencies among the components of the Java intermediate language -- the Java bytecode. Models
AE Flores-Montoya +5 more
core +1 more source
This article presents a solver‐agnostic domain‐specific language (DSL) for computational structural mechanics that strengthens interoperability in virtual product development. Using a hierarchical data model, the DSL enables seamless exchange between diverse simulation tools and numerical methods.
Martin Rädel +3 more
wiley +1 more source
An Analysis on Java Programming Language Decompiler Capabilities
Along with new artifact development, software engineering also includes other tasks. One of these tasks is the reverse engineering of binary artifacts. This task can be performed by using special “decompiler” software.
Gusarovs Konstantins
doaj +1 more source
Partial Evaluation of String Obfuscations for Java Malware Detection [PDF]
The fact that Java is platform independent gives hackers the opportunity to write exploits that can target users on any platform, which has a JVM implementation. Metasploit is a well-known source of Javaexploits and to circumvent detection by Anti Virus (
Chawdhary, Aziem +2 more
core +1 more source
Laser‐Induced Graphene from Waste Almond Shells
Almond shells, an abundant agricultural by‐product, are repurposed to create a fully bioderived almond shell/chitosan composite (ASC) degradable in soil. ASC is converted into laser‐induced graphene (LIG) by laser scribing and proposed as a substrate for transient electronics.
Yulia Steksova +9 more
wiley +1 more source
Gods, birds, and trees; Variation in illustrated Javanese pawukon manuscripts
Many libraries in the world own illustrated manuscripts containing calendrical divination based on the Javanese 30 seven-day wuku cycle. Although the contents of these pawukon manuscript have been studied, the illustrations they often contain have almost
Dick van der Meij
doaj +1 more source
A scalable bio‐templated approach using spray‐coating and thermal annealing fabricates cellulose nanofibril (CNF) films loaded with gold nanoparticles (Au NPs) and graphene oxide (GO) hybrids as Surface‐enhanced Raman scattering (SERS) substrates. The 3D CNF network ensures uniform Au NPs distribution, while annealing induces more hotspots, confirmed ...
Yingjian Guo +14 more
wiley +1 more source
El reconocimiento de los “derechos sobre la biodiversidad” en el sistema internacional implica su comercialización creando un nuevo paradigma de poder.
José Soria Java
doaj
nanopub-java: A Java Library for Nanopublications
The concept of nanopublications was first proposed about six years ago, but it lacked openly available implementations. The library presented here is the first one that has become an official implementation of the nanopublication community. Its core features are stable, but it also contains unofficial and experimental extensions: for publishing to a ...
openaire +3 more sources
Reverse Engineering Environment for Teaching Secure Coding in Java [PDF]
Few toolsets for program analysis and Java learning system provide an integrated console, debugger, and reverse engineered visualizer. We present an interactive debugging environment for Java which helps students to understand the secure coding by ...
Lee, Young, Yang, Jeong
core +1 more source

