Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,429,591 papers from all fields of science
Search
Sign In
Create Free Account
Java bytecode
Known as:
JVM bytecode
, Java byte code
, Java byte-code
Java bytecode is the instruction set of the Java virtual machine. Each bytecode is composed of one, or in some cases two bytes that represent the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ARM architecture
Adaptive optimization
Android
Clojure
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Termination Graphs for Java Bytecode
Marc Brockschmidt
,
Carsten Otto
,
C. V. Essen
,
J. Giesl
Verification, Induction, Termination Analysis
2010
Corpus ID: 2681345
To prove termination of Java Bytecode (JBC) automatically, we transform JBC to finite termination graphs which represent all…
Expand
2009
2009
Termination and Cost Analysis with COSTA and its User Interfaces
E. Albert
,
P. Arenas
,
+5 authors
D. Zanardini
PROLE
2009
Corpus ID: 7731831
2004
2004
A symbolic Java virtual machine for test case generation
R. Müller
,
C. Lembeck
,
H. Kuchen
IASTED Conf. on Software Engineering
2004
Corpus ID: 2459781
Quality management is becoming a more and more important part of the software development process. As software testing is…
Expand
2002
2002
Bigram analysis of Java bytecode sequences
D. O'Donoghue
,
Aine Leddy
,
James F. Power
,
J. Waldron
PPPJ/IRE
2002
Corpus ID: 16505532
We report on a project that performed a bigram analysis of dynamic bytecode sequences. The objective was to identify the most…
Expand
2000
2000
Dependence analysis of Java bytecode
Jianjun Zhao
Proceedings 24th Annual International Computer…
2000
Corpus ID: 17545326
Understanding program dependencies in a computer program is essential for many software engineering tasks such as program…
Expand
1999
1999
Java Bytecode Verification by Model Checking
D. Basin
,
Stefan Friedrich
,
J. Posegga
,
Harald Vogt
International Conference on Computer Aided…
1999
Corpus ID: 38701138
Verification plays a central role in the security of Java bytecode: the Java bytecode verifier performs a static analysis to…
Expand
1999
1999
Characterization of Java applications at bytecode and ultra-SPARC machine code levels
R. Radhakrishnan
,
J. Rubio
,
L. John
Proceedings IEEE International Conference on…
1999
Corpus ID: 2798435
The paper identifies some of the most important execution characteristics of a recent suite of Java benchmarks (SPEC JVM98) from…
Expand
1998
1998
Intra-procedural inference of static types for java bytecode
Etienne M. Gagnon
,
L. Hendren
1998
Corpus ID: 6072040
In this paper, we present practical algorithms for inferring static types for local variables and stack locations of Java…
Expand
Highly Cited
1997
Highly Cited
1997
Automatically exploiting implicit parallelism in Java
Aart J. C. Bik
,
Dennis Gannon
Concurrency Practice and Experience
1997
Corpus ID: 18207938
In this paper we show how implicit parallelism in Java programs can be made explicit by a restructuring compiler using the multi…
Expand
1997
1997
A Java bytecode optimizer using side‐effect analysis
L. Clausen
1997
Corpus ID: 62489637
This paper describes Cream, an optimizer for Java bytecode using side-effect analysis to improve the optimizations. Dead-code…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE