Sciweavers

1234 search results - page 169 / 247
» Privacy-preserving Virtual Machine
Sort
View
ECOOPWEXCEPTION
2000
Springer
15 years 8 months ago
Portable Implementation of Continuation Operators in Imperative Languages by Exception Handling
Abstract. This paper describes a scheme of manipulating (partial) continuations in imperative languages such as Java and C++ in a portable manner, where the portability means that ...
Tatsurou Sekiguchi, Takahiro Sakamoto, Akinori Yon...
140
Voted
JAVA
1999
Springer
15 years 8 months ago
Analysis and Development of Java Grande Benchmarks
Understanding the performance behaviour of Java Virtual Machines is important to Java systems developers and to applications developers. We review a range of Java benchmark progra...
J. A. Mathew, Paul D. Coddington, Kenneth A. Hawic...
JIT
1999
Springer
123views Database» more  JIT 1999»
15 years 8 months ago
Byte Code Engineering
The term “Java” is used to denote two different concepts: the language itself and the related execution environment, the Java Virtual Machine (JVM), which executes byte code in...
Markus Dahm
120
Voted
IEEEPACT
1998
IEEE
15 years 8 months ago
Exploiting Method-Level Parallelism in Single-Threaded Java Programs
Method speculation of object-oriented programs attempts to exploit method-level parallelism (MLP) by executing sequential method invocations in parallel, while still maintaining c...
Michael K. Chen, Kunle Olukotun
CARDIS
1998
Springer
161views Hardware» more  CARDIS 1998»
15 years 8 months ago
Formal Proof of Smart Card Applets Correctness
: The new Gemplus smart card is based on the Java technology, embedding a virtual machine. The security policy uses mechanisms that are based on Java properties. This language prov...
Jean-Louis Lanet, Antoine Requet