Sciweavers

48 search results - page 2 / 10
» Unique Renaming of Java Using Source Transformation
Sort
View
CORR
2010
Springer
137views Education» more  CORR 2010»
13 years 3 months ago
Verification of Java Bytecode using Analysis and Transformation of Logic Programs
State of the art analyzers in the Logic Programming (LP) paradigm are nowadays mature and sophisticated. They allow inferring a wide variety of global properties including terminat...
Elvira Albert, Miguel Gómez-Zamalloa, Laure...
IWPC
2007
IEEE
13 years 10 months ago
Metrics for Measuring the Effectiveness of Decompilers and Obfuscators
Java developers often use decompilers to aid reverse engineering and obfuscators to prevent it. Decompilers translate low-level class files to Java source and can produce “good...
Nomair A. Naeem, Michael Batchelder, Laurie J. Hen...
TOOLS
2008
IEEE
13 years 10 months ago
Guarded Program Transformations Using JTL
There is a growing research interest in employing the logic paradigm for making queries on software in general, and OOP software in particular. We describes a side-effect-free tech...
Tal Cohen, Joseph Gil, Itay Maman
GECCO
2009
Springer
166views Optimization» more  GECCO 2009»
13 years 10 months ago
Genetic programming in the wild: evolving unrestricted bytecode
We describe a methodology for evolving Java bytecode, enabling the evolution of extant, unrestricted Java programs, or programs in other languages that compile to Java bytecode. B...
Michael Orlov, Moshe Sipper
ECLIPSE
2005
ACM
13 years 5 months ago
Incomplete resolution of references in Eclipse
In the Eclipse JDT, the Java reference resolution rules are applied as fully as possible, thereby either determining the unique target for a given reference or signalling that the...
Joseph J. C. Chang, Robert J. Walker