Results 11 to 20 of about 14,055 (238)

Deadlock detection of Java Bytecode [PDF]

open access: yes, 2017
This paper presents a technique for deadlock detection of Java programs. The technique uses typing rules for extracting infinite-state abstract models of the dependencies among the components of the Java intermediate language -- the Java bytecode. Models
AE Flores-Montoya   +5 more
core   +3 more sources

Optimizing Java bytecodes [PDF]

open access: yesConcurrency: Practice and Experience, 1997
We have developed a research compiler for Java class files. The compiler, which we call Briki, is designed to test new compilation techniques. We focus on optimizations which are only possible or much easier to perform on a high-level intermediate representation.
Michal Cierniak, Wei Li 0015
openaire   +1 more source

Platform Independent Timing of Java Virtual Machine Bytecode Instructions

open access: diamondElectronic Notes in Theoretical Computer Science, 2008
James F Power
exaly   +2 more sources

Java bytecode verification on Java cards [PDF]

open access: yesProceedings of the 2004 ACM symposium on Applied computing, 2004
A Java program is usually translated into an intermediate language, known as Java Virtual Machine Language (JVML), which is then executed by a Java Virtual Machine (JVM). Before its execution a JVML program is verified to prevent a wide range of run-time errors.
BARBUTI, ROBERTO, CATAUDELLA S.
openaire   +3 more sources

Integrated Java Bytecode Verification [PDF]

open access: yesElectronic Notes in Theoretical Computer Science, 2005
AbstractExisting Java verifiers perform an iterative data-flow analysis to discover the unambiguous type of values stored on the stack or in registers. Our novel verification algorithm uses abstract interpretation to obtain definition/use information for each register and stack location in the program, which in turn is used to transform the program ...
Andreas Gal   +2 more
openaire   +1 more source

SNITCH: Dynamic Dependent Information Flow Analysis for Independent Java Bytecode [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2019
Software testing is the most commonly used technique in the industry to certify the correctness of software systems. This includes security properties like access control and data confidentiality.
Eduardo Geraldo, João Costa Seco
doaj   +1 more source

Towards a General Framework for Formal Reasoning about Java Bytecode Transformation [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2013
Program transformation has gained a wide interest since it is used for several purposes: altering semantics of a program, adding features to a program or performing optimizations.
Jean-Louis Lanet   +2 more
doaj   +1 more source

Static Resource Analysis for Java Bytecode Using Amortisation and Separation Logic

open access: diamondElectronic Notes in Theoretical Computer Science, 2011
Damon Fenacci, Kenneth MacKenzie
exaly   +2 more sources

Applying Java bytecode static instrumentation for software dynamic analysis

open access: yesТруды Института системного программирования РАН, 2018
This paper focuses on dynamic analysis of Java programs. We consider the following limitations: analysis tool may not have access to target program source code, and the program may be interpreted by a non-standard virtual machine with bytecode format ...
S. P. Vartanov, M. K. Ermakov
doaj   +1 more source

A Non-Null Annotation Inferencer for Java Bytecode [PDF]

open access: yes, 2008
We present a non-null annotations inferencer for the Java bytecode language. We previously proposed an analysis to infer non-null annotations and proved it soundness and completeness with respect to a state of the art type system.
Hubert, Laurent
core   +6 more sources

Home - About - Disclaimer - Privacy