Results 51 to 60 of about 14,055 (238)
Register‐Based and Stack‐Based Virtual Machines: Which Perform Better in JIT Compilation Scenarios?
ABSTRACT Background Just‐In‐Time (JIT) compilation plays a critical role in optimizing the performance of modern virtual machines (VMs). While the architecture of VMs–register‐based or stack‐based–has long been a subject of debate, empirical analysis focusing on JIT compilation performance is relatively sparse. Objective In this study, we aim to answer
Bohuslav Šimek +2 more
wiley +1 more source
Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android [PDF]
A common security architecture, called the permission-based security model (used e.g. in Android and Blackberry), entails intrinsic risks. For instance, applications can be granted more permissions than they actually need, what we call a "permission gap".
Bartel, Alexandre +3 more
core +8 more sources
Termination Analysis of Java Bytecode [PDF]
Termination analysis has received considerable attention, traditionally in the context of declarative programming, and recently also for imperative languages. In existing approaches, termination is performed on source programs. However, there are many situations, including mobile code, where only the compiled code is available.
Elvira Albert +5 more
openaire +1 more source
Retargeting Android applications to Java bytecode [PDF]
The Android OS has emerged as the leading platform for SmartPhone applications. However, because Android applications are compiled from Java source into platform-specific Dalvik bytecode, existing program analysis tools cannot be used to evaluate their behavior.
Damien Octeau +2 more
openaire +1 more source
We assess five hypotheses about the interaction of structural coverage‐based and tester goal‐based objectives in search‐based test generation, focusing on coverage, goal attainment, fault detection, test suite size, test case length and the impact of search budget.
Afonso Fontes, Gregory Gay, Robert Feldt
wiley +1 more source
JooFlux: Hijacking Java 7 InvokeDynamic To Support Live Code Modifications [PDF]
Changing functional and non-functional software implementation at runtime is useful and even sometimes critical both in development and production environments. JooFlux is a JVM agent that allows both the dynamic replacement of method implementations and
Mouël, Frédéric Le, Ponge, Julien
core +3 more sources
Symbolic and analytic techniques for resource analysis of Java bytecode [PDF]
Recent work in resource analysis has translated the idea of amortised resource analysis to imperative languages using a program logic that allows mixing of assertions about heap shapes, in the tradition of separation logic, and assertions about ...
Aspinall, David +3 more
core +3 more sources
This work proposes a model for defining Convention over Configuration (CoC) for annotations. With this model, if a convention is present, the framework will consider that the element is configured by a specific annotation. The model was evaluated in an experiment where participants implemented CoC pattern using our approach and Java Reflection API. Our
Everaldo Gomes +3 more
wiley +1 more source
Java Bytecode Verification: Algorithms and Formalizations [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +3 more sources
How Software Design Affects Energy Performance: A Systematic Literature Review
This SLR provides insight into the state of the art of the field investigating how software transformation impacts energy performance. While a wide array of design patterns, refactorings, and code smells have been examined from this perspective, there remains much to explore in future work.
Déaglán Connolly Bree +1 more
wiley +1 more source

