Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,677,430 papers from all fields of science
Search
Sign In
Create Free Account
Java bytecode
Known as:
JVM bytecode
, Java byte code
, Java byte-code
Java bytecode is the instruction set of the Java virtual machine. Each bytecode is composed of one, or in some cases two bytes that represent the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ARM architecture
Adaptive optimization
Android
Clojure
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Janalyzer: A Static Analysis Tool for Java Bytecode
D. Balasubramanian
,
Zhenkai Zhang
,
Dan McDermet
,
G. Karsai
2017
Corpus ID: 19208279
Static analysis attempts to discover program properties and answer questions about a program’s potential behavior without…
Expand
2010
2010
Stack Bound Inference for Abstract Java Bytecode
Shengyi Wang
,
Zongyan Qiu
,
S. Qin
,
W. Chin
4th IEEE International Symposium on Theoretical…
2010
Corpus ID: 6742893
Ubiquitous embedded systems are often resource-constrained. Developing software for these systems should take into account…
Expand
2006
2006
String Concatenation Optimization on Java Bytecode
Y. Tian
Software Engineering Research and Practice
2006
Corpus ID: 11010918
String concatenation via the “+” operator is one of the most convenient things to do in Java, and also one of the most expensive…
Expand
2005
2005
Verified Java Bytecode Verification (Verified Java Bytecode Verification)
Gerwin Klein
it - Information Technology
2005
Corpus ID: 41971193
Zusammenfassung Der Bytecode Verifier ist ein essenzieller Bestandteil der Sicherheitsarchitektur der Programmierplattform Java…
Expand
2004
2004
A symbolic Java virtual machine for test case generation
R. Müller
,
C. Lembeck
,
H. Kuchen
IASTED Conf. on Software Engineering
2004
Corpus ID: 2459781
Quality management is becoming a more and more important part of the software development process. As software testing is…
Expand
Review
2004
Review
2004
Enforcing system-wide properties
Michael Eichberg
,
M. Mezini
,
Thorsten Schäfer
,
Claus Beringer
,
K. M. Hamel
Australian Software Engineering Conference…
2004
Corpus ID: 7641409
Policy enforcement is a mechanism for ensuring that system components follow certain programming practices, comply with specified…
Expand
1998
1998
A prototype bytecode parallelization tool
Aart J. C. Bik
,
Dennis Gannon
Concurrency Practice and Experience
1998
Corpus ID: 42501669
This paper provides a manual for javab, a prototype tool that supports the automatic detection and exploitation of implicit loop…
Expand
Review
1997
Review
1997
Java bytecode optimizations
Dan Lambright
Proceedings IEEE COMPCON 97. Digest of Papers
1997
Corpus ID: 34087374
We present our results obtained from applying well known optimizations to Java bytecodes. We survey the optimizations implemented…
Expand
1997
1997
A Java bytecode optimizer using side‐effect analysis
L. Clausen
1997
Corpus ID: 62489637
This paper describes Cream, an optimizer for Java bytecode using side-effect analysis to improve the optimizations. Dead-code…
Expand
1996
1996
Programming the Internet in Ada 95
S. Tucker Taft
International Conference on Reliable Software…
1996
Corpus ID: 12096874
A new paradigm for computing is emerging based on the Internet and the World Wide Web, accompanied by a new standard programming…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE