Results 1 - 10
of
138
Bytecode Transformation for Portable Thread Migration in Java
, 2000
"... This paper proposes a Java bytecode transformation algorithm for realizing transparent thread migration in a portable and efficient manner. In contrast to previous studies, our approach does not need extended virtual machines nor source code of target programs. The whole state of stack frames is sav ..."
Abstract
-
Cited by 59 (2 self)
- Add to MetaCart
This paper proposes a Java bytecode transformation algorithm for realizing transparent thread migration in a portable and efficient manner. In contrast to previous studies, our approach does not need extended virtual machines nor source code of target programs. The whole state of stack frames
A Portable research framework for the execution of java bytecode
, 2002
"... Compilation to bytecode paired with interpretation is often used as a technique to easily build prototypes for new programming languages. Some languages, includ-ing Java, push this further and use the bytecode layer to isolate programs from the underlying platform. Current state-of-the-art commercia ..."
Abstract
-
Cited by 29 (4 self)
- Add to MetaCart
the question: How fast can a portable, easily modifiable Java bytecode interpreter be? In order to address this question, we have designed and developed the SableVM research framework, a portable interpreter-based Java virtual machine written in portable C.
Dependence Analysis of Java Bytecode
- In IEEE Annual International Computer Software and Applications Conference
, 2000
"... Understanding program dependencies in a computer program is essential for many software engineering tasks such as program understanding, testing, debugging, reverse engineering, and maintenance. In this paper, we present an approach to dependence analysis of Java bytecode, and discuss some applicati ..."
Abstract
-
Cited by 9 (0 self)
- Add to MetaCart
applications of our technique, which include Java bytecode slicing, understanding, and testing. 1 Introduction Java is a new object-oriented programming language and has achieved widespread acceptance because it emphasizes portability [1]. In Java, programs are being compiled into a portable binary format call
The Functions of Java Bytecode
- In Workshop on the Formal Underpinnings of the Java Paradigm
, 1998
"... Java bytecode provides a portable representation for programs that allows executable content to be embedded in web pages, transferred across a network, and executed on a remote user's machine. Features like these provide many new opportunities for developers, but special precautions must be tak ..."
Abstract
-
Cited by 10 (0 self)
- Add to MetaCart
Java bytecode provides a portable representation for programs that allows executable content to be embedded in web pages, transferred across a network, and executed on a remote user's machine. Features like these provide many new opportunities for developers, but special precautions must
Speculatively vectorized bytecode
- In Proceedings of the International Conference on High Performance and Embedded Architectures and Compilers (HiPEAC
, 2011
"... ABSTRACT Diversity is a confirmed trend of computing systems, which present a complex and moving target to software developers. Virtual machines and just-in-time compilers have been proposed to mitigate the complexity of these systems. They do so by offering a single and stable abstract machine mod ..."
Abstract
-
Cited by 3 (3 self)
- Add to MetaCart
-in-time vectorization. Vapor SIMD first applies complex ahead-of-time techniques to vectorize source code and produce bytecode of a standard portable format. Advanced JIT compilers can then quickly tailor this bytecode to exploit SIMD capabilities of appropriate platforms, yielding up to 14.7× and 11.8× speedups on x86
JAVA BYTECODE OBFUSCATION by
, 2007
"... Programs written for machine execution will always be susceptible to information theft. This information can include trademarked algorithms, data embedded in the program, or even data the program accesses. As technology advances computer scientists are building more and more powerful tools for rever ..."
Abstract
- Add to MetaCart
for reverse-engineering such as decompilers. The Java programming language is particularly open to reverse-engineering attacks because of its well-defined, open, and portable binary format. We examine one area of better-securing the intellectual property of a Java program; obfuscation. Obfuscation of a
ByCounter: Portable Runtime Counting of Bytecode Instructions and Method Invocations
"... For bytecode-based applications, runtime instruction counts can be used as a platform-independent application execution metric, and also can serve as the basis for bytecode-based performance prediction. However, different instruction types have different execution durations, so they must be counted ..."
Abstract
-
Cited by 6 (3 self)
- Add to MetaCart
, and it can be used without modifications on any JVM. We evaluate the presented approach by successfully applying it to multiple Java applications on different JVMs, and discuss the runtime costs of applying ByCounter to these cases. Key words: Java, bytecode, counting, portable, fine-grained
Using Bytecode Instruction Counting as Portable CPU Consumption Metric
- Electr. Notes Theor. Comput. Sci
, 2006
"... Accounting for the CPU consumption of applications is crucial for software development to detect and remove performance bottlenecks (profiling) and to evaluate the performance of algorithms (benchmarking). Moreover, extensible middleware may exploit resource consumption information in order to detec ..."
Abstract
-
Cited by 9 (3 self)
- Add to MetaCart
bytecode instructions. We explain the advantages of this approach to CPU management and present five case studies that show the benefits in different settings.
Exact and Portable Profiling for the JVM Using Bytecode Instruction Counting
"... This paper presents a novel profiling approach, which is entirely based on program transformation techniques in order to enable exact profiling, preserving complete call stacks, method invocation counters, and bytecode instruction counters. We exploit the number of executed bytecode instructions as ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
This paper presents a novel profiling approach, which is entirely based on program transformation techniques in order to enable exact profiling, preserving complete call stacks, method invocation counters, and bytecode instruction counters. We exploit the number of executed bytecode instructions
Annotating the Java Bytecodes in Support of Optimization
, 1997
"... The efficient execution of Java programs presents a challenge to hardware and software designers alike. The difficulty however lies with the Javabytecodes. Their model of a simplistic, platform-independent stack machine is well-suited for portability, though at the expense of execution speed. Variou ..."
Abstract
-
Cited by 19 (1 self)
- Add to MetaCart
The efficient execution of Java programs presents a challenge to hardware and software designers alike. The difficulty however lies with the Javabytecodes. Their model of a simplistic, platform-independent stack machine is well-suited for portability, though at the expense of execution speed
Results 1 - 10
of
138