Sciweavers

26 search results - page 4 / 6
» Termination Graphs for Java Bytecode
Sort
View
APLAS
2006
ACM
15 years 3 months ago
A Bytecode Logic for JML and Types
This document contains the Isabelle/HOL sources underlying our paper A bytecode logic for JML and types [2], updated to Isabelle 2008. We present a program logic for a subset of s...
Lennart Beringer, Martin Hofmann
IH
2004
Springer
15 years 3 months ago
Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks
Abstract. This paper presents an implementation of the novel watermarking method proposed by Venkatesan, Vazirani, and Sinha in their recent paper A Graph Theoretic Approach to Sof...
Christian S. Collberg, Andrew Huntwork, Edward Car...
SEFM
2008
IEEE
15 years 4 months ago
A Fast Algorithm to Compute Heap Memory Bounds of Java Card Applets
We present an approach to find upper bounds of heap space for Java Card applets. Our method first transforms an input bytecode stream into a control flow graph (CFG), and then ...
Tuan-Hung Pham, Anh-Hoang Truong, Ninh-Thuan Truon...
APLAS
2003
ACM
15 years 2 months ago
Controlling and Optimizing the Usage of One Resource
This paper studies the problem of resource availability in the context of mobile code for embedded systems such as smart cards. It presents an architecture dedicated to controlling...
Antoine Galland, Mathieu Baudet
EMSOFT
2004
Springer
15 years 3 months ago
Approximation of the worst-case execution time using structural analysis
We present a technique to approximate the worst-case execution time that combines structural analysis with a loop-bounding algorithm based on local induction variable analysis. St...
Matteo Corti, Thomas R. Gross