Results 101 to 110 of about 14,055 (238)

A Verifier for Region-Annotated Java Bytecodes

open access: yesElectronic Notes in Theoretical Computer Science, 2005
AbstractThis paper presents a verifier for the memory-safe execution of extended Java bytecodes that support region-based memory management and explicit deallocation primitives. The verifier reads in region-annotated bytecodes that augment the standard Java bytecodes with instructions for creating and removing memory regions, allocating objects in ...
Sigmund Cherem, Radu Rugina
openaire   +1 more source

Test Data Generation of Bytecode by CLP Partial Evaluation

open access: yes, 2008
We employ existing partial evaluation (PE) techniques developed for Constraint Logic Programming (CLP) in order to automatically generate test-case generators for glass-box testing of bytecode. Our approach consists of two independent CLP PE phases.
Albert Albiol, Elvira   +2 more
core  

Test Case Generation for Object-Oriented Imperative Languages in CLP

open access: yes, 2010
Testing is a vital part of the software development process. Test Case Generation (TCG) is the process of automatically generating a collection of test cases which are applied to a system under test.
Albert   +7 more
core   +1 more source

Applying dynamic analysis for defect detection in Java-applications

open access: yesТруды Института системного программирования РАН, 2018
This paper provides an overview of program analysis techniques and describes practical implementation of these techniques for automatic software defect detection. The paper focuses on program dynamic analysis technique based on tainted data flow tracing,
Sergey Vartanov, Alexander Gerasimov
doaj  

Verified Java bytecode verification. [PDF]

open access: yes, 2007
The bytecode verifier is an important part of Java's security architecture. This thesis presents a fully formal, executable, and machine checked specification of a representative subset of the Java Virtual Machine and its bytecode verifier together with a proof that the bytecode verifier is safe.
openaire   +1 more source

Smart contracts software metrics: A first study. [PDF]

open access: yesPLoS One, 2023
Tonelli R   +3 more
europepmc   +1 more source

Class Hierarchy Complementation: Soundly Completing a Partial Type Graph [PDF]

open access: yes, 2013
We present the problem of class hierarchy complementa- tion: given a partially known hierarchy of classes together with subtyping constraints (“A has to be a transitive sub- type of B”) complete the hierarchy so that it satisfies all con- straints.
Balatsouras, George, Smaragdakis, Yannis
core  

12th International Workshop on Termination (WST 2012) : WST 2012, February 19–23, 2012, Obergurgl, Austria / ed. by Georg Moser [PDF]

open access: yes, 2012
This volume contains the proceedings of the 12th International Workshop on Termination (WST 2012), to be held February 19–23, 2012 in Obergurgl, Austria.
Moser, Georg
core  

Home - About - Disclaimer - Privacy