Sciweavers

6796 search results - page 354 / 1360
» Java for Embedded Systems
Sort
View
IJNSEC
2007
142views more  IJNSEC 2007»
15 years 4 months ago
Java Bytecode Dependence Analysis for Secure Information Flow
Java programs can be transmitted and executed on another host in bytecode format, thus the sensitive information of the host may be leaked via these assembly-like programs. Inform...
Gaowei Bian, Ken Nakayama, Yoshitake Kobayashi, Ma...
AUSAI
2010
Springer
15 years 3 months ago
Tuning Java to Run Interactive Multiagent Simulations over Jason
Java-based simulation environments are currently used by many multiagent systems (MAS), since they mainly provide portability as well as an interesting reduction of the development...
Víctor Fernández-Bauset, Francisco G...
FGIT
2009
Springer
15 years 11 months ago
Automatic Detection for JavaScript Obfuscation Attacks in Web Pages through String Pattern Analysis
Recently, most of malicious web pages include obfuscated codes in order to circumvent the detection of signature-based detection systems .It is difficult to decide whether the sti...
YoungHan Choi, TaeGhyoon Kim, SeokJin Choi, CheolW...
ISORC
2008
IEEE
15 years 11 months ago
A Real-Time Java Component Model
The Real-Time Specification for Java (RTSJ) [10] is becoming a popular choice in the world of real-time programming. However, the complexities introduced by RTSJ bring the needs ...
Ales Plsek, Philippe Merle, Lionel Seinturier
HICSS
2007
IEEE
164views Biometrics» more  HICSS 2007»
15 years 10 months ago
A Multipurpose Code Coverage Tool for Java
Most test coverage analyzers help in evaluating the effectiveness of testing by providing data on statement and branch coverage achieved during testing. If made available, the cov...
Raghu Lingampally, Atul Gupta, Pankaj Jalote