Java bytecode

Results: 201



#Item
21Simple verification technique for complex Java bytecode subroutines

Simple verification technique for complex Java bytecode subroutines

Add to Reading List

Source URL: www.kestrel.edu

Language: English - Date: 2004-06-29 02:28:59
    22Mastering Java Bytecode with Learn someASM bytecode to yourself!

    Mastering Java Bytecode with Learn someASM bytecode to yourself!

    Add to Reading List

    Source URL: s3-eu-west-1.amazonaws.com

    - Date: 2012-05-25 06:22:43
      23COMP 520 FallThe language

      COMP 520 FallThe language

      Add to Reading List

      Source URL: www.sable.mcgill.ca

      Language: English - Date: 2007-09-24 10:40:20
      24COMP 520 FallVirtual machines (1) Virtual machines

      COMP 520 FallVirtual machines (1) Virtual machines

      Add to Reading List

      Source URL: www.sable.mcgill.ca

      Language: English - Date: 2007-10-19 00:48:21
      25COMP 520 FallVirtual machines (1) COMP 520 Fall 2007

      COMP 520 FallVirtual machines (1) COMP 520 Fall 2007

      Add to Reading List

      Source URL: www.sable.mcgill.ca

      Language: English - Date: 2007-10-19 00:48:32
      26A Provably Correct Stackless Intermediate Representation for Java Bytecode Delphine Demange1 , Thomas Jensen2 , and David Pichardie2 2  1

      A Provably Correct Stackless Intermediate Representation for Java Bytecode Delphine Demange1 , Thomas Jensen2 , and David Pichardie2 2 1

      Add to Reading List

      Source URL: www.irisa.fr

      Language: English - Date: 2010-09-23 11:52:52
        27COMP 520 FallNative code generation (1) Native code generation

        COMP 520 FallNative code generation (1) Native code generation

        Add to Reading List

        Source URL: www.sable.mcgill.ca

        Language: English - Date: 2007-11-03 22:45:28
        28Optimizing R VM: Allocation Removal and Path Length Reduction via Interpreter-level Specialization Haichuan Wang1, Peng Wu2, David Padua1 1  University of Illinois at Urbana-Champaign

        Optimizing R VM: Allocation Removal and Path Length Reduction via Interpreter-level Specialization Haichuan Wang1, Peng Wu2, David Padua1 1 University of Illinois at Urbana-Champaign

        Add to Reading List

        Source URL: cgo.org

        Language: English - Date: 2014-02-24 13:06:24
        29Aachen Department of Computer Science Technical Report Modular Termination Proofs of Recursive Java Bytecode Programs

        Aachen Department of Computer Science Technical Report Modular Termination Proofs of Recursive Java Bytecode Programs

        Add to Reading List

        Source URL: verify.rwth-aachen.de

        Language: English - Date: 2015-04-16 09:49:59
          30Automated Detection of Non-Termination and NullPointerExceptions for Java Bytecode M. Brockschmidt, T. Str¨ oder, C. Otto, J. Giesl LuFG Informatik 2, RWTH Aachen University, Germany

          Automated Detection of Non-Termination and NullPointerExceptions for Java Bytecode M. Brockschmidt, T. Str¨ oder, C. Otto, J. Giesl LuFG Informatik 2, RWTH Aachen University, Germany

          Add to Reading List

          Source URL: verify.rwth-aachen.de

          Language: English - Date: 2015-04-16 09:49:59