Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Soot: A Java bytecode optimization framework
R Vallée-Rai, P Co, E Gagnon, L Hendren… - CASCON First Decade …, 2010 - dl.acm.org
This paper presents Soot, a framework for optimizing Java* bytecode. The framework is
implemented in Java and supports three intermediate representations for representing Java …
implemented in Java and supports three intermediate representations for representing Java …
Techniques for obtaining high performance in Java programs
This survey describes research directions in techniques to improve the performance of
programs written in the Java programming language. The standard technique for Java …
programs written in the Java programming language. The standard technique for Java …
[PDF][PDF] Tempo: Specializing systems applications and beyond
Permission to make digital/hard copy of part or all of this work for personal or classroom use
is granted without fee provided that the copies are not made or distributed for profit or …
is granted without fee provided that the copies are not made or distributed for profit or …
Mondrian memory protection
Mondrian memory protection (MMP) is a fine-grained protection scheme that allows multiple
protection domains to flexibly share memory and export protected services. In contrast to …
protection domains to flexibly share memory and export protected services. In contrast to …
Practical virtual method call resolution for Java
V Sundaresan, L Hendren, C Razafimahefa… - ACM SIGPLAN …, 2000 - dl.acm.org
This paper addresses the problem of resolving virtual method and interface calls in Java
bytecode. The main focus is on a new practical technique that can be used to analyze large …
bytecode. The main focus is on a new practical technique that can be used to analyze large …
Optimizing Java bytecode using the Soot framework: Is it feasible?
R Vallée-Rai, E Gagnon, L Hendren, P Lam… - … CC 2000 Held as Part of …, 2000 - Springer
This paper presents Soot, a framework for optimizing Java™ bytecode. The framework is
implemented in Java and supports three intermediate representations for representing Java …
implemented in Java and supports three intermediate representations for representing Java …
Mobile Agents and the Future of the Internet
D Kotz, RS Gray - ACM Operating Systems Review, 1999 - digitalcommons.dartmouth.edu
Use of the Internet has exploded in recent years with the appearance of the World-Wide
Web. In this paper, we show how current technological trends may lead to a system based …
Web. In this paper, we show how current technological trends may lead to a system based …
Using production grammars in software testing
Extensible typesafe systems, such as Java, rely critically on a large and complex software
base for their overall protection and integrity, and are therefore difficult to test and verify …
base for their overall protection and integrity, and are therefore difficult to test and verify …
Removing unnecessary synchronization in Java
J Bogda, U Hölzle - Proceedings of the 14th ACM SIGPLAN conference …, 1999 - dl.acm.org
Java programs perform many synchronization operations on data structures. Some of these
synchronization are unnecessary; in particular, if an object is reachable only by a single …
synchronization are unnecessary; in particular, if an object is reachable only by a single …
Escape analysis for JavaTM Theory and practice
B Blanchet - ACM Transactions on Programming Languages and …, 2003 - dl.acm.org
Escape analysis is a static analysis that determines whether the lifetime of data may exceed
its static scope. This paper first presents the design and correctness proof of an escape …
its static scope. This paper first presents the design and correctness proof of an escape …