Design of the Java HotSpot™ client compiler for Java 6

T Kotzmann, C Wimmer, H Mössenböck… - ACM Transactions on …, 2008 - dl.acm.org
Version 6 of Sun Microsystems' Java HotSpot™ VM ships with a redesigned version of the
client just-in-time compiler that includes several research results of the last years. The client …

Modeling the development of energy network software, taking into account the detection and elimination of vulnerabilities

I Kotenko, K Izrailov, M Buinevich, I Saenko, R Shorey - Energies, 2023 - mdpi.com
This paper solves the problem of modeling the scheme for developing software systems,
which can be used in building solutions for secure energy networks. A development scheme …

[HTML][HTML] Моделирование программы с уязвимостями с позиции эволюции ее представлений. Часть 1. Схема жизненного цикла

КЕ Израилов - Труды учебных заведений связи, 2023 - cyberleninka.ru
Изложены результаты исследования процесса создания программ и возникающих при
этом уязвимостей. В первой части цикла статей предлагается графическая схема …

Performance modeling and prediction of enterprise JavaBeans with layered queuing network templates

J Xu, A Oufimtsev, M Woodside, L Murphy - Proceedings of the 2005 …, 2005 - dl.acm.org
Component technologies, such as Enterprise Java Beans (EJB) and. NET, are used in
enterprise servers with requirements for high performance and scalability. This work …

Modeling a Program with Vulnerabilities in the Terms of Its Representations Evolution. Part 1. Life Cycle Scheme

KE Izrailov - Proceedings of Telecommunication Universities, 2023 - journals.rcsi.science
The investigation results of the creating programs process and the resulting vulnerabilities
are presented. The first part of the articles series offers a life cycle graphical scheme of the …

[图书][B] Trustworthy compilers

VO Safonov - 2010 - books.google.com
This unique guide book explains and teaches the concept of trustworthy compilers based on
50+ years of worldwide experience in the area of compilers, and on the author's own 30+ …

A new idiom recognition framework for exploiting hardware-assist instructions

M Kawahito, H Komatsu, T Moriyama, H Inoue… - ACM SIGARCH …, 2006 - dl.acm.org
Modern processors support hardware-assist instructions (such as TRT and TROT
instructions on IBM zSeries) to accelerate certain functions such as delimiter search and …

[图书][B] Efficient bytecode verification and compilation in a virtual machine

A Gal - 2006 - dl.acm.org
Applications written in modern dynamic languages such as Java or NET are shipped in the
form of high-level intermediate bytecode. A virtual machine (VM) is used on the target …

Register allocation with graph coloring by ant colony optimization

CN Lintzmayer, MH Mulati… - 2011 30th International …, 2011 - ieeexplore.ieee.org
The goal of register allocation is to allocate an unbounded number of program values to a
finite number of machine registers. In this paper, we describe a new algorithm for …

Optimizing just-in-time compilation in a network of nodes

T Kramp, T Visegrady - US Patent 10,698,708, 2020 - Google Patents
A bytecode construction, a method, and a system for optimizing just in time compilation. The
bytecode includes several regions wherein a region is a logical sequence of one or more …