|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 165 occurrences of 133 keywords
|
|
|
Results
Found 143 publication records. Showing 143 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
67 | Ludovic Casset |
Development of an Embedded Verifier for Java Card Byte Code Using Formal Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FME ![In: FME 2002: Formal Methods - Getting IT Right, International Symposium of Formal Methods Europe, Copenhagen, Denmark, July 22-24, 2002, Proceedings, pp. 290-309, 2002, Springer, 3-540-43928-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Byte Code Verification, Formal Methods, B Method |
65 | Iain Bate, Guillem Bernat, G. Murphy, Peter P. Puschner |
Low-level analysis of a portable Java byte code WCET analysis framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RTCSA ![In: 7th International Workshop on Real-Time Computing and Applications Symposium (RTCSA 2000), 12-14 December 2000, Cheju Island, South Korea, pp. 39-, 2000, IEEE Computer Society, 0-7695-0930-4. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
low-level analysis, portable Java byte code, machine-independent program flow analysis, machine-dependent timing analysis, worst-case execution frequencies, platform-dependent information, processor pipeline, platform-independent approach, Java, timing, software performance evaluation, pipeline processing, software portability, program diagnostics, worst-case execution time analysis, program constructs |
63 | Arno Puder |
Byte Code Transformations using XSL Stylesheets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand, pp. 563-568, 2008, IEEE Computer Society, 978-0-7695-3263-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
60 | Ruben Alexandersson, D. Krishna Chaitanya, Peter Öhman, Yasir Siraj |
A Technique for Fault Tolerance Assessment of COTS Based Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security, 24th International Conference, SAFECOMP 2005, Fredrikstad, Norway, September 28-30, 2005, Proceedings, pp. 165-178, 2005, Springer, 3-540-29200-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
57 | Sebastian Lange, Udo Kebschull |
Virtual Hardware Byte Code as a Design Platform for Reconfigurable Embedded Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: 2003 Design, Automation and Test in Europe Conference and Exposition (DATE 2003), 3-7 March 2003, Munich, Germany, pp. 10302-10309, 2003, IEEE Computer Society, 0-7695-1870-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Virtual Hardware Machine, Byte Code, FPGA |
56 | J. Shane Culpepper, Alistair Moffat |
Enhanced Byte Codes with Restricted Prefix Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPIRE ![In: String Processing and Information Retrieval, 12th International Conference, SPIRE 2005, Buenos Aires, Argentina, November 2-4, 2005, Proceedings, pp. 1-12, 2005, Springer, 3-540-29740-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
56 | S. Tucker Taft |
Programming the Internet in Ada 95. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ada-Europe ![In: Reliable Software Technologies - Ada-Europe '96, 1996 Ada-Europe International Conference on Reliable Software Technologies, Montreux, Switzerland, June 10-14, 1996, Proceedings, pp. 1-16, 1996, Springer, 3-540-61317-X. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
54 | Arno Puder, Sascha Häberling, Rainer Todtenhoefer |
An MDA Approach to Byte Code Level Cross-Compilation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand, pp. 251-256, 2008, IEEE Computer Society, 978-0-7695-3263-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Andrew K. Wright, Suresh Jagannathan, Cristian Ungureanu, Aaron Hertzmann |
Compiling Java to a Typed Lambda-Calculus: A Preliminary Report. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Types in Compilation ![In: Types in Compilation, Second International Workshop, TIC '98, Kyoto, Japan, March 25-27, 1998, Proceedings, pp. 9-27, 1998, Springer, 3-540-64925-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
47 | Misko Hevery |
Testability explorer: using byte-code analysis to engineer lasting social changes in an organization's software development process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA Companion ![In: Companion to the 23rd Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2008, October 19-13, 2007, Nashville, TN, USA, pp. 747-748, 2008, ACM, 978-1-60558-220-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
byte-code analysis, refactoring, unit testing, testability, social engineering |
46 | Ludovic Casset, Lilian Burdy, Antoine Requet |
Formal Development of an Embedded Verifier for Java Card Byte Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2002 International Conference on Dependable Systems and Networks (DSN 2002), 23-26 June 2002, Bethesda, MD, USA, Proceedings, pp. 51-58, 2002, IEEE Computer Society, 0-7695-1597-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
45 | Danny Dubé, Marc Feeley |
BIT: A Very Compact Scheme System for Microcontrollers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
High. Order Symb. Comput. ![In: High. Order Symb. Comput. 18(3-4), pp. 271-298, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Scheme language, byte-code, embedded system, microcontroller, real-time garbage collection |
45 | Vincent Balat, Olivier Danvy |
Strong Normalization by Type-Directed Partial Evaluation and Run-Time Code Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Types in Compilation ![In: Types in Compilation, Second International Workshop, TIC '98, Kyoto, Japan, March 25-27, 1998, Proceedings, pp. 240-252, 1998, Springer, 3-540-64925-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
43 | Laurent Deruelle, Nordine Melab, Mourad Bouneffa, Henri Basson |
Analysis and Manipulation of Distributed Multi-Language Software Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 10 November 2001, Florence, Italy, pp. 45-56, 2001, IEEE Computer Society, 0-7695-1387-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Byte-code, Profiling, Source code analysis, Change Propagation, Decompiling |
42 | Eryk Laskowski, Richard Olejnik, Bernard Toursel, Marek Tudruj |
Scheduling Byte Code-Defined Data Dependence Graphs of Object Oriented Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PARELEC ![In: 2004 International Conference on Parallel Computing in Electrical Engineering (PARELEC 2004), 7-10 September 2004, Dresden, Germany, pp. 398-401, 2004, IEEE Computer Society, 0-7695-2080-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Morten Rhiger |
Compiling Embedded Programs to Byte Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PADL ![In: Practical Aspects of Declarative Languages, 4th International Symposium, PADL 2002, Portland, OR, USA, January 19-20, 2002, Proceedings, pp. 120-136, 2002, Springer, 3-540-43092-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
domain-specific language, Just-in-time compilation, embedded language, OCaml |
42 | Joachim Posegga, Harald Vogt |
Byte Code Verification for Java Smart Card Based on Model Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings, pp. 175-190, 1998, Springer, 3-540-65004-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
41 | Stefan Paal, Reiner Kammüller, Bernd Freisleben |
Java Class Deployment Using Class Collections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NetObjectDays ![In: Objects, Components, Architectures, Services, and Applications for a Networked World, International Conference NetObjectDays, NODe 2002, Erfurt, Germany, October 7-10, 2002, Revised Papers, pp. 135-151, 2002, Springer, 3-540-00737-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
38 | Praveen Sivadasan, P. Sojan Lal, Naveen Sivadasan |
JDATATRANS for array obfuscation in Java source codes to defeat reverse engineering from decompiled codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bangalore Compute Conf. ![In: Proceedings of the 2nd Bangalore Annual Compute Conference, Compute 2009, Bangalore, India, January 9-10, 2009, pp. 13, 2009, ACM, 978-1-60558-476-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
restructured arrays, source code obfuscation, reverse engineering |
36 | Ryan M. Golbeck, Gregor Kiczales |
A machine code model for efficient advice dispatch. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VMIL ![In: Proceedings of the 1st Workshop on Virtual Machines and Intermediate Languages for Emerging Modularization Mechanisms, VMIL 2007, Vancouver, British Columbia, Canada, March 12-16, 2007, pp. 2, 2007, ACM. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
aspect-oriented programming, AspectJ |
36 | Guillem Bernat, Alan Burns 0001, Andy J. Wellings |
Portable worst-case execution time analysis using Java Byte Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECRTS ![In: 12th Euromicro Conference on Real-Time Systems (ECRTS 2000), 19-21 June 2000, Stockholm, Sweden, Proceedings, pp. 81-88, 2000, IEEE Computer Society, 0-7695-0734-4. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
35 | Morris Matsa, Eric Perkins, Abraham Heifets, Margaret Gaitatzes Kostoulas, Daniel Silva 0001, Noah Mendelsohn, Michelle Leger |
A high-performance interpretive approach to schema-directed parsing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 16th International Conference on World Wide Web, WWW 2007, Banff, Alberta, Canada, May 8-12, 2007, pp. 1093-1114, 2007, ACM, 978-1-59593-654-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
XML, performance, compiler, interpreter, parsing, schema |
35 | J. Shane Culpepper, Alistair Moffat |
Phrase-Based Pattern Matching in Compressed Text. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPIRE ![In: String Processing and Information Retrieval, 13th International Conference, SPIRE 2006, Glasgow, UK, October 11-13, 2006, Proceedings, pp. 337-345, 2006, Springer, 3-540-45774-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Andrew Begel, Steven McCanne, Susan L. Graham |
BPF+: Exploiting Global Data-Flow Optimization in a Generalized Packet Filter Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 1999 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30 - September 3, 1999, Cambridge, Massachusetts, USA, pp. 123-134, 1999, ACM, 1-58113-135-6. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
32 | Eryk Laskowski, Marek Tudruj, Richard Olejnik, Bernard Toursel |
Java Byte Code Scheduling Based on the Most-Often-Used-Paths in Programs with Branches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPDC ![In: 4th International Symposium on Parallel and Distributed Computing (ISPDC 2005), 4-6 July 2005, Lille, France, pp. 21-27, 2005, IEEE Computer Society, 0-7695-2434-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Hideaki Yanagisawa, Minoru Uehara, Hideki Mori |
Development Methodology of ASIP Based on Java Byte Code Using HW/SW Co-Design System for Processor Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops), 23-24 March 2004, Hachioji, Tokyo, Japan, pp. 831-837, 2004, IEEE Computer Society, 0-7695-2087-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
HW/SW Codesign system, C-DASH, ASIP, Java processor, ISA |
27 | Patrick Klinkoff, Engin Kirda, Christopher Kruegel, Giovanni Vigna |
Extending .NET security to unmanaged code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 6(6), pp. 417-428, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
NET Security, Unmanaged Code, Sandboxing |
27 | Patrick Klinkoff, Christopher Krügel, Engin Kirda, Giovanni Vigna |
Extending .NET Security to Unmanaged Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 1-16, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Matthias Jacob, Mariusz H. Jakubowski, Prasad Naldurg, Chit Wei Saw, Ramarathnam Venkatesan |
The Superdiversifier: Peephole Individualization for Software Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings, pp. 100-120, 2008, Springer, 978-3-540-89597-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Ludovic Casset, Jean-Louis Lanet |
Increasing smart card dependability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS European Workshop ![In: Proceedings of the 10th ACM SIGOPS European Workshop, Saint-Emilion, France, July 1, 2002, pp. 209-212, 2002, ACM. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Xin Hui Li, Tiancheng Liu, Ying Li 0012, Ying Chen 0004 |
SPIN: Service Performance Isolation Infrastructure in Multi-tenancy Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSOC ![In: Service-Oriented Computing - ICSOC 2008, 6th International Conference, Sydney, Australia, December 1-5, 2008. Proceedings, pp. 649-663, 2008, 978-3-540-89647-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
resource accounting and management, byte code instrumentation, performance monitoring, Multi-tenancy |
25 | Hendra Saputra, Guangyu Chen, Richard R. Brooks, Narayanan Vijaykrishnan, Mahmut T. Kandemir, Mary Jane Irwin |
Code protection for resource-constrained embedded devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCTES ![In: Proceedings of the 2004 ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES'04), Washington, DC, USA, June 11-13, 2004, pp. 240-248, 2004, ACM, 1-58113-806-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Java security, java byte code, mono-alphabetic, poly-alphabetic, cryptography, substitution |
25 | Hoi Y. Chan, Trieu C. Chieu |
An approach and tools to automate externalization of application logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA Companion ![In: Companion to the 19th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2004, October 24-28, 2004, Vancouver, BC, Canada, pp. 194-195, 2004, ACM, 1-58113-833-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
byte code, code generation, automate, rules, aspect, externalization, rule engine, business logic |
25 | Ting-Wei Hou, Fuh-Gwo Chen, J. L. Lee, Y. L. Cheng |
Distributed and Parallel Execution of Java Programs on a DSM System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCGRID ![In: First IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2001), May 15-18, 2001, Brisbane, Australia, pp. 555-561, 2001, IEEE Computer Society, 0-7695-1010-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
DSM system and byte-code, Java Virtual Machine |
25 | R. L. Engelbrecht, Derrick G. Kourie |
Issues in Translating Smalltalk into Java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CC ![In: Compiler Construction, 7th International Conference, CC'98, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS'98, Lisbon, Portugal, March 28 - April 4, 1998, Proceedings, pp. 249-263, 1998, Springer, 3-540-64304-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Java byte code, instance methods, class methods, Java, object oriented programming, reflection, translation, Smalltalk |
24 | Torsten Illmann, Tilman Krueger, Frank Kargl, Michael Weber 0001 |
Transparent Migration of Mobile Agents Using the Java Platform Debugger Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobile Agents ![In: Mobile Agents, 5th International Conference, MA 2001 Atlanta, GA, USA, December 2-4, 2001, Proceedings, pp. 198-212, 2001, Springer, 3-540-42952-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Ian Welch, Robert J. Stroud |
From Dalang to Kava - The Evolution of a Reflective Java Extension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Reflection ![In: Meta-Level Architectures and Reflection, Second International Conference, Reflection'99, Saint-Malo, France, July 19-21, 1999, Proceedings, pp. 2-21, 1999, Springer, 3-540-66280-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
24 | Luca Cardelli |
The Amber Machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Combinators and Functional Programming Languages ![In: Combinators and Functional Programming Languages, Thirteenth Spring School of the LITP, Val d'Ajol, France, May 6-10, 1985, Proceedings, pp. 48-70, 1985, Springer, 3-540-17184-3. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
|
23 | J. A. Mathew, A. J. Silis, Kenneth A. Hawick |
Inter-Server Transport Performance of Java Bytecode in a Metacomputing Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TOOLS (28) ![In: TOOLS 1998: 28th International Conference on Technology of Object-Oriented Languages and Systems, 23-26 November 1998, Melbourne, Australia, pp. 264-, 1998, IEEE Computer Society, 0-7695-0053-6. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
22 | Robert Macketanz, Wolfgang Karl |
JVX - A Rapid Prototyping System Based on Java and FPGAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: Field-Programmable Logic and Applications, From FPGAs to Computing Paradigm, 8th International Workshop, FPL'98, Tallinn, Estonia, August 31 - September 3, 1998, Proceedings, pp. 99-108, 1998, Springer, 3-540-64948-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
22 | Muhammad Amin, Tamleek Ali Tanveer, Mohammad Tehseen, Murad Khan, Fakhri Alam Khan, Sajid Anwar |
Static malware detection and attribution in android byte-code through an end-to-end deep system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 102, pp. 112-126, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Yuxi Xie, Hanbo Deng, Lizhi Peng, Zhenxiang Chen |
Accurate Identification of Internet Video Traffic Using Byte Code Distribution Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICA3PP (1) ![In: Algorithms and Architectures for Parallel Processing - 18th International Conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part I, pp. 46-58, 2018, Springer, 978-3-030-05050-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Jierui Liu, Tianyong Wu, Xi Deng, Jun Yan 0009, Jian Zhang 0001 |
InsDal: A safe and extensible instrumentation tool on Dalvik byte-code for Android applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SANER ![In: IEEE 24th International Conference on Software Analysis, Evolution and Reengineering, SANER 2017, Klagenfurt, Austria, February 20-24, 2017, pp. 502-506, 2017, IEEE Computer Society, 978-1-5090-5501-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Alexandru Trifan, Marilena Anghelus, Rodica Constantinescu |
Natural language processing model compiling natural language into byte code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpeD ![In: International Conference on Speech Technology and Human-Computer Dialogue, SpeD 2017, Bucharest, Romania, July 6-9, 2017, pp. 1-6, 2017, IEEE, 978-1-5090-6497-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Mads Ohm Larsen |
Algebraic Transformation of Descriptive Vector Byte-code Sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Middleware Doctoral Symposium ![In: Proceedings of the Doctoral Symposium of the 17th International Middleware Conference, Middleware Doctoral Symposium 2016, Trento, Italy, December 13, 2016, pp. 1:1-1:2, 2016, ACM, 978-1-4503-4665-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Mohammed Amine Kasmi, Mostafa Azizi, Jean-Louis Lanet |
Side channel analysis techniques towards a methodology for reverse engineering of Java Card byte-code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: 11th International Conference on Information Assurance and Security, IAS 2015, Marrakech, Morocco, December 14-16, 2015, pp. 104-110, 2015, IEEE, 978-1-4673-8715-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Tsuyoshi Fujiwara, Osamu Mizuno, Pattara Leelaprute |
Fault-Prone Byte-Code Detection Using Text Classifier. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PROFES ![In: Product-Focused Software Process Improvement - 16th International Conference, PROFES 2015, Bolzano, Italy, December 2-4, 2015, Proceedings, pp. 415-430, 2015, Springer, 978-3-319-26843-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Junxian Zhang, Zhoujun Li 0001, Xianchen Zheng |
PathWalker: A Dynamic Symbolic Execution Tool Based on LLVM Byte Code Instrumentation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SETTA ![In: Dependable Software Engineering: Theories, Tools, and Applications - First International Symposium, SETTA 2015, Nanjing, China, November 4-6, 2015, Proceedings, pp. 227-242, 2015, Springer, 978-3-319-25941-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Achkar Amine, Mohammed Benattou, Jean-Louis Lanet |
Generating control flow graph from Java card byte code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIST ![In: Third IEEE International Colloquium in Information Science and Technology, CIST 2014, Tetouan, Morocco, October 20-22, 2014, pp. 206-212, 2014, IEEE, 978-1-4799-5979-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
22 | Reinhard Berlach, Michael Lackner, Christian Steger, Johannes Loinig, Ernst Haselsteiner |
Memory-efficient on-card byte code verification for Java cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2014, Vienna, Austria, January 20, 2014, pp. 37-40, 2014, ACM, 978-1-4503-2484-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
22 | Kamil Jezek, Lukas Holy, Antonin Slezacek, Premek Brada |
Software Components Compatibility Verification Based on Static Byte-Code Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROMICRO-SEAA ![In: 39th Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2013, Santander, Spain, September 4-6, 2013, pp. 145-152, 2013, IEEE Computer Society, 978-0-7695-5091-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Andrea Calvagna, Emiliano Tramontana |
Combinatorial Validation Testing of Java Card Byte Code Verifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 2013 Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Hammamet, Tunisia, June 17-20, 2013, pp. 347-352, 2013, IEEE Computer Society, 978-1-4799-0405-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Benedikt Meurer |
Just-In-Time compilation of OCaml byte-code ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1011.6223, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
22 | Arno Puder, Sascha Häberling |
Byte code level cross-compilation for developing web applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. Comput. Program. ![In: Sci. Comput. Program. 74(5-6), pp. 379-396, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Rasmus Andersen, Brian Vinter |
The Scientific Byte Code Virtual Machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCA ![In: Proceedings of the 2008 International Conference on Grid Computing & Applications, GCA 2008, Las Vegas, Nevada, USA, July 14-17, 2008, pp. 175-181, 2008, CSREA Press, 1-60132-068-X. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
22 | Michael Leuschel |
Towards Demonstrably Correct Compilation of Java Byte Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMCO ![In: Formal Methods for Components and Objects, 7th International Symposium, FMCO 2008, Sophia Antipolis, France, October 21-23, 2008, Revised Lectures, pp. 119-138, 2008, Springer, 978-3-642-04166-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Eryk Laskowski, Marek Tudruj, Richard Olejnik, Bernard Toursel |
Byte-code scheduling of Java programs with branches for desktop grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 23(8), pp. 977-982, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Carl J. De Pasquale |
Collecting Java Performance Measurements Using Byte Code Engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. CMG Conference ![In: 30th International Computer Measurement Group Conference, December 5-10, 2004, Las Vegas, Nevada, USA, Proceedings, pp. 751-764, 2004, Computer Measurement Group. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
22 | Lilian Burdy, Ludovic Casset, Antoine Requet |
Développement formel d'un vérifieur embarqué de byte-code Java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Tech. Sci. Informatiques ![In: Tech. Sci. Informatiques 22(1), pp. 33-60, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Ian Welch, Robert J. Stroud |
Kava - Using Byte code Rewriting to add Behavioural Reflection to Java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COOTS ![In: 6th USENIX Conference on Object-Oriented Technologies and Systems, January 29 - February 2, 2001, San Antonio, Texas, USA, pp. 119-130, 2001, USENIX. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
22 | Eetu Ojanen, Jari Veijalainen |
Compressibility of WML and WMLScript Byte Code: Initial Results. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RIDE ![In: Proceedings of the Tenth International Workshop on Research Issues on Data Engineering: Middleware for Mobile Business Applications and E-Commerce, San Diego, California, USA, February 27-28, 2000, pp. 55-62, 2000, IEEE Computer Society, 0-7695-0531-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
22 | Markus Dahm |
Byte Code Engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Java-Informations-Tage ![In: JIT '99, Java-Informations-Tage 1999, Düsseldorf 20./21. September 1999, pp. 267-277, 1999, Springer, 3-540-66464-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
22 | J Strother Moore |
Proving Theorems About Java-Like Byte Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Correct System Design ![In: Correct System Design, Recent Insight and Advances, (to Hans Langmaack on the occasion of his retirement from his professorship at the University of Kiel), pp. 139-162, 1999, Springer, 3-540-66624-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
22 | Brad Harvey, James A. Foster, Deborah A. Frincke |
Towards Byte Code Genetic Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 1999), 13-17 July 1999, Orlando, Florida, USA, pp. 1234, 1999, Morgan Kaufmann, 1-55860-611-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
22 | Guido Masera, Gianluca Piccinini, Massimo Ruo Roch, Maurizio Zamboni |
A Quantitative Approach to the Design of an Optimized Hardware Interpreter for Java Byte-Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Applied Informatics ![In: Proceedings of the 17th IASTED International Conference on Applied Informatics, February 15-18, 1999, Innsbruck, Austria, pp. 51-54, 1999, IASTED/ACTA Press, 0-88986-241-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
22 | Brad Balfour |
Combining Ada 95, Java Byte Code, and the Distributed Systems Annex. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRI-Ada ![In: Conference, The annual meeting of the Ada programming world, TRI-Ada 1997, November 9-13, 1997, St. Louis, Missouri, USA, pp. 247-260, 1997, ACM, 0-89791-981-5. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Java, Ada |
22 | Lloyd B. Anderson |
Multilingual Text Processing in a Two-Byte Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COLING ![In: 10th International Conference on Computational Linguistics and 22nd Annual Meeting of the Association for Computational Linguistics, Proceedings of COLING '84, July 2-6, 1984, Stanford University, California, USA., pp. 1-4, 1984, ACL. The full citation details ...](Pics/full.jpeg) |
1984 |
DBLP BibTeX RDF |
|
20 | Pietu Pohjalainen, Juha Taina |
Self-configuring object-to-relational mapping queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPPJ ![In: Proceedings of the 6th International Symposium on Principles and Practice of Programming in Java, PPPJ 2008, Modena, Italy, September 9-11, 2008, pp. 53-59, 2008, ACM, 978-1-60558-223-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
object-to-relational mapping, persistence, software maintainability |
20 | David Cachera, Thomas P. Jensen, David Pichardie, Gerardo Schneider |
Certified Memory Usage Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FM ![In: FM 2005: Formal Methods, International Symposium of Formal Methods Europe, Newcastle, UK, July 18-22, 2005, Proceedings, pp. 91-106, 2005, Springer, 3-540-27882-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
certified memory analysis, Program analysis, theorem proving, constraint solving |
20 | Eryk Laskowski, Marek Tudruj, Richard Olejnik, Bernard Toursel |
Java Programs Optimization Based on the Most-Often-Used-Paths Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPAM ![In: Parallel Processing and Applied Mathematics, 6th International Conference, PPAM 2005, Poznan, Poland, September 11-14, 2005, Revised Selected Papers, pp. 944-951, 2005, Springer, 3-540-34141-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Graham N. C. Kirby |
Session 1: Overview. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POS ![In: Persistent Object Systems, 9th International Workshop, POS-9, Lillehammer, Norway, September 6-8, 2000, Revised Papers, pp. 1-3, 2000, Springer, 3-540-42735-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
20 | Austin Kim, J. Morris Chang |
Java Bytecode Optimization with Advanced Instruction Folding Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISHPC ![In: High Performance Computing, Third International Symposium, ISHPC 2000, Tokyo, Japan, October 16-18, 2000. Proceedings, pp. 268-275, 2000, Springer, 3-540-41128-3. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
19 | Fubo Zhang, Erik H. D'Hollander |
Using Hammock Graphs to Structure Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 30(4), pp. 231-245, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
optimization, parallel processing, compilers, Program transformation, structured programming, correctness proofs, software/program verification |
19 | YoungHan Choi, TaeGhyoon Kim, Seokjin Choi, Cheolwon Lee |
Automatic Detection for JavaScript Obfuscation Attacks in Web Pages through String Pattern Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGIT ![In: Future Generation Information Technology, First International Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings, pp. 160-172, 2009, Springer, 978-3-642-10508-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Lei Yang, Jian-Yun Shang, Yan-Ping Zhao |
An Efficient Dictionary Mechanism Based on Double-Byte. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICADL ![In: Asian Digital Libraries. Looking Back 10 Years and Forging New Frontiers, 10th International Conference on Asian Digital Libraries, ICADL 2007, Hanoi, Vietnam, December 10-13, 2007, Proceedings, pp. 420-423, 2007, Springer, 978-3-540-77093-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Double-Byte, multi-language, Information Retrieve, Dictionary |
19 | Hoonmo Yang, Moonkey Lee |
Design of a Cycle-Accurate User-Retargetable Instruction-Set Simulator Using Process-Based Scheduling Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational and Information Science, First International Symposium, CIS 2004, Shanghai, China, December 16-18, 2004, Proceedings, pp. 266-273, 2004, Springer, 3-540-24127-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | M. Muztaba Fuad, Michael J. Oudshoorn |
Transformation of Existing Programs into Autonomic and Self-healing Entities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECBS ![In: 14th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2007), 26-29 March 2007, Tucson, Arizona, USA, pp. 133-144, 2007, IEEE Computer Society, 0-7695-2772-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Rajiv A. Ravindran, Pracheeti D. Nagarkar, Ganesh S. Dasika, Eric D. Marsman, Robert M. Senger, Scott A. Mahlke, Richard B. Brown |
Compiler Managed Dynamic Instruction Placement in a Low-Power Code Cache. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CGO ![In: 3nd IEEE / ACM International Symposium on Code Generation and Optimization (CGO 2005), 20-23 March 2005, San Jose, CA, USA, pp. 179-190, 2005, IEEE Computer Society, 0-7695-2298-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Konstantin Hyppönen, David Naccache, Elena Trichina, Alexei Tchoulkine |
Trading-Off Type-Inference Memory Complexity against Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings, pp. 60-71, 2003, Springer, 3-540-20150-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Nils Maltesson, David Naccache, Elena Trichina, Christophe Tymen |
Applet Verification Strategiesfor RAM-Constrained Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers, pp. 118-137, 2002, Springer, 3-540-00716-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
18 | Ramesh Radhakrishnan, Ravi Bhargava, Lizy Kurian John |
Improving Java performance using hardware translation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICS ![In: Proceedings of the 15th international conference on Supercomputing, ICS 2001, Sorrento, Napoli, Italy, June 16-21, 2001, pp. 427-439, 2001, ACM, 1-58113-410-X. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
18 | Ian Welch, Robert J. Stroud |
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings, pp. 309-323, 2000, Springer, 3-540-41031-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
16 | Daniel A. Sadilek |
Energy-aware compilation for wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MidSens ![In: Proceedings of the Second International Workshop on Middleware for Sensor Networks, MidSens 2007, November 30, 2007, Newport Beach, CA, USA, Co-located with Middleware 2007, pp. 25-30, 2007, ACM, 978-1-59593-929-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
wireless sensor networks, compilation, virtual machines, high-level languages, energy-awareness, network reprogramming |
16 | Robert Dyer 0001, Harish Narayanappa, Hridesh Rajan |
Nu: preserving design modularity in object code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 31(6), pp. 1-2, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Roberto Costa, Erven Rohou |
Comparing the size of .NET applications with native code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODES+ISSS ![In: Proceedings of the 3rd IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2005, Jersey City, NJ, USA, September 19-21, 2005, pp. 99-104, 2005, ACM, 1-59593-161-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
managed environments, NET, bytecode, code size |
16 | Bálint Molnár, Imre Berényi, Bence Siklósi |
Function Call Trap of Java Codes with the Help of AspectJ and XML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSMR ![In: 6th European Conference on Software Maintenance and Reengineering (CSMR 2002), 11-13 March 2002, Budapest, Hungary, Proceedings, pp. 207-210, 2002, IEEE Computer Society, 0-7695-1438-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Olivier Danvy, Bernd Grobauer, Morten Rhiger |
A Unifying Approach to Goal-Directed Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAIG ![In: Semantics, Applications, and Implementation of Program Generation, Second International Workshop, SAIG 2001, Florence, Italy, September 6, 2001, Proceedings, pp. 108-125, 2001, Springer, 3-540-42558-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
16 | A. C. Norman |
Compact Delivery Support for REDUCE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISCO ![In: Design and Implementation of Symbolic Computation Systems, International Symposium, DISCO '93, Gmunden, Austria, September 15-17, 1993, Proceedings, pp. 331-340, 1993, Springer, 3-540-57235-X. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
14 | Henrique Rebêlo, Ricardo Massa Ferreira Lima, Márcio Cornélio, Sérgio Soares |
A JML Compiler Based on AspectJ. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICST ![In: First International Conference on Software Testing, Verification, and Validation, ICST 2008, Lillehammer, Norway, April 9-11, 2008, pp. 541-544, 2008, IEEE Computer Society, 978-0-7695-3127-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
JML compiler, Aspect-Oriented Programming, AspectJ, Design by Contract, JML language |
14 | Frank Dévai, Mizanur Rahman |
The Suitability of the Java Language for Computer-Graphics and Visualisation Research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IV ![In: International Conference on Information Visualisation, IV 2002, London, England, UK, July 10-12, 2002, pp. 273-, 2002, IEEE Computer Society, 0-7695-1656-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
14 | David Naccache, Alexei Tchoulkine, Christophe Tymen, Elena Trichina |
Reducing the Memory Complexity of Type-Inference Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings, pp. 109-121, 2002, Springer, 3-540-00164-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Mark R. Swanson, Robert R. Kessler, Gary Lindstrom |
An Implementation of Portable Standard LISP on the BBN Butterfly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LISP and Functional Programming ![In: Proceedings of the 1988 ACM Conference on LISP and Functional Programming, LFP 1988, Snowbird, Utah, USA, July 25-27, 1988, pp. 132-142, 1988, ACM, 0-89791-273-X. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
LISP |
12 | Martin Plümicke |
Intersection types in Java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPPJ ![In: Proceedings of the 6th International Symposium on Principles and Practice of Programming in Java, PPPJ 2008, Modena, Italy, September 9-11, 2008, pp. 181-188, 2008, ACM, 978-1-60558-223-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
program design and implementation, code generation, type system, type inference, language design |
12 | Francesco Logozzo, Manuel Fähndrich |
Pentagons: a weakly relational abstract domain for the efficient validation of array accesses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, pp. 184-188, 2008, ACM, 978-1-59593-753-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
NET framework, bounds checking, numerical domains, static analysis, abstract interpretation, abstract domains |
12 | Norm Rubin |
Issues and challenges in compiling for graphics processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CGO ![In: Sixth International Symposium on Code Generation and Optimization (CGO 2008), April 5-9, 2008, Boston, MA, USA, pp. 2, 2008, ACM, 978-1-59593-978-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
compilers, graphics |
12 | Jens Dietrich 0001, Vyacheslav Yakovlev, Catherine McCartin, Graham Jenson, Manfred Duchrow |
Cluster analysis of Java dependency graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOFTVIS ![In: Proceedings of the ACM 2008 Symposium on Software Visualization, Ammersee, Germany, September 16-17, 2008, pp. 91-94, 2008, ACM, 978-1-60558-112-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
anti-pattern detection, refactoring, cluster analysis, dependency analysis |
12 | Ting-Wei Hou, Fuh-Gwo Chen |
An anomaly in an interpreter using GCC source-code-level register allocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGPLAN Notices ![In: ACM SIGPLAN Notices 42(4), pp. 9-13, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
GCC source-code-level register allocation, performance, interpreter |
12 | Carsten Gremzow |
Compiled low-level virtual instruction set simulation and profiling for code partitioning and ASIP-synthesis in hardware/software co-design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCSC ![In: Proceedings of the 2007 Summer Computer Simulation Conference, SCSC 2007, San Diego, California, USA, July 16-19, 2007, pp. 741-748, 2007, Simulation Councils, Inc., 1-56555-316-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
hardware/software co-synthesis, instruction set architecture simulation, quantitative dataflow analysis, profiling, coarse-grained parallelism, LLVM |
12 | Arnoldo José Müller Molina, Takeshi Shinohara |
On approximate matching of programs for protecting libre software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASCON ![In: Proceedings of the 2006 conference of the Centre for Advanced Studies on Collaborative Research, October 16-19, 2006, Toronto, Ontario, Canada, pp. 275-289, 2006, IBM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Freeman Yufei Huang, C. Barry Jay, David B. Skillicorn |
Adaptiveness in well-typed Java bytecode verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASCON ![In: Proceedings of the 2006 conference of the Centre for Advanced Studies on Collaborative Research, October 16-19, 2006, Toronto, Ontario, Canada, pp. 248-262, 2006, IBM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 143 (100 per page; Change: ) Pages: [ 1][ 2][ >>] |
|