Treffer 21 - 40 von 197

21

An approach for analyzing bytecode information flow
Bian, G. ; Nakayama, K. ; Kobayashi, Y. ; et al.
IEEE International Symposium on Communications and Information Technology, 2005. ISCIT 2005. Communications and Information Technologies Communications and Information Technology, 2005. ISCIT 2005. IEEE International Symposium on. 2:1096-1099 2005

Konferenz
22

Projected control graph for computing relevant program behaviors
Tamrawi, Ahmed ; Kothari, Suresh
In Science of Computer Programming 1 October 2018 163:93-114

Fachzeitschrift
24

Lightweight Bytecode Verification
Rose, Eva
Journal of Automated Reasoning. November 2003 31(3-4):303-334

Fachzeitschrift
25

Optimisation Validation
Aspinall, David ; Beringer, Lennart ; Momigliano, Alberto
In Electronic Notes in Theoretical Computer Science 19 July 2007 176(3):37-59

Fachzeitschrift
26

Simple verification technique for complex Java bytecode subroutines.
Coglio, Alessandro
Concurrency & Computation: Practice & Experience; Jun2004, Vol. 16 Issue 7, p647-670, 24p, 8 Diagrams, 6 Charts

JAVA programming languag... OBJECT-oriented programm... COMPUTER programming SUBROUTINES (Computer pr... COMPUTER software
Fachzeitschrift
27

Memory model sensitive bytecode verification
Huynh, Thuan Quang ; Roychoudhury, Abhik
Formal Methods in System Design: An International Journal. December 2007 31(3):281-305

Fachzeitschrift
29

Dieses Ergebnis kann Gästen nicht angezeigt werden.

30

Finite Integer Computations: An Algebraic Foundation for Their Correctness
Glesner, Sabine
Formal Aspects of Computing: Applicable Formal Methods. 06 2006 18(2):244-262

Fachzeitschrift
31

Dieses Ergebnis kann Gästen nicht angezeigt werden.

32

A Java processor suitable for applications of smart card
Zhang Jianjie ; Li Feihui ; Ge Yuanqing ; et al.
ASICON 2001. 2001 4th International Conference on ASIC Proceedings (Cat. No.01TH8549) ASICON 2001 ASIC, 2001. Proceedings. 4th International Conference on. :736-739 2001

Konferenz
33

Formal specification and verification of a JVM and its bytecode verifier
Liu, Hanbing ; Moore, J Strother, 1947-

Java virtual machine Programming languages (E... Computer software--Verif...
Dissertation
34

Verified Bytecode Subroutines
G. Klein ; M. Wildmoser ; The Pennsylvania State University CiteSeerX Archives
http://www4.in.tum.de/publ/papers/KleinW-JAR02.pdf.

Java Bytecode Verification Subroutines Theorem Proving Data Flow Analysis Isabelle
Fachzeitschrift
35

Java Bytecode Verification is not possible (Extended Abstract
Robert F. Stärk ; Joachim Schmid ; The Pennsylvania State University CiteSeerX Archives
http://www.tydo.de/files/papers/javaBytecode.pdf.

Fachzeitschrift
37

Lightweight Bytecode Verification
Eva Rose ; Kristoffer Høgsbro Rose ; The Pennsylvania State University CiteSeerX Archives
http://www-dse.doc.ic.ac.uk/~sue/oopsla/rose.f.ps.

Fachzeitschrift
38

Verified Bytecode Subroutines
Gerwin Klein ; Martin Wildmoser ; Technische Universität München ; et al.
http://www4.in.tum.de/publ/papers/KleinW-TPHOLs03.pdf.

Fachzeitschrift
39

Lightweight Bytecode Verification.
Eva Rose
Journal of Automated Reasoning; Sep2003, Vol. 31 Issue 3/4, p303-334, 32p

DATA protection EMBEDDED computer system... MOBILE communication sys... MANIPULATIVE behavior
Fachzeitschrift
40

Dieses Ergebnis kann Gästen nicht angezeigt werden.


Filter