Design of the Java HotSpot™ client compiler for Java 6
T Kotzmann, C Wimmer, H Mössenböck… - ACM Transactions on …, 2008 - dl.acm.org
Version 6 of Sun Microsystems' Java HotSpot™ VM ships with a redesigned version of the
client just-in-time compiler that includes several research results of the last years. The client …
client just-in-time compiler that includes several research results of the last years. The client …
Modeling the development of energy network software, taking into account the detection and elimination of vulnerabilities
This paper solves the problem of modeling the scheme for developing software systems,
which can be used in building solutions for secure energy networks. A development scheme …
which can be used in building solutions for secure energy networks. A development scheme …
[HTML][HTML] Моделирование программы с уязвимостями с позиции эволюции ее представлений. Часть 1. Схема жизненного цикла
КЕ Израилов - Труды учебных заведений связи, 2023 - cyberleninka.ru
Изложены результаты исследования процесса создания программ и возникающих при
этом уязвимостей. В первой части цикла статей предлагается графическая схема …
этом уязвимостей. В первой части цикла статей предлагается графическая схема …
Performance modeling and prediction of enterprise JavaBeans with layered queuing network templates
J Xu, A Oufimtsev, M Woodside, L Murphy - Proceedings of the 2005 …, 2005 - dl.acm.org
Component technologies, such as Enterprise Java Beans (EJB) and. NET, are used in
enterprise servers with requirements for high performance and scalability. This work …
enterprise servers with requirements for high performance and scalability. This work …
Modeling a Program with Vulnerabilities in the Terms of Its Representations Evolution. Part 1. Life Cycle Scheme
KE Izrailov - Proceedings of Telecommunication Universities, 2023 - journals.rcsi.science
The investigation results of the creating programs process and the resulting vulnerabilities
are presented. The first part of the articles series offers a life cycle graphical scheme of the …
are presented. The first part of the articles series offers a life cycle graphical scheme of the …
[图书][B] Trustworthy compilers
VO Safonov - 2010 - books.google.com
This unique guide book explains and teaches the concept of trustworthy compilers based on
50+ years of worldwide experience in the area of compilers, and on the author's own 30+ …
50+ years of worldwide experience in the area of compilers, and on the author's own 30+ …
A new idiom recognition framework for exploiting hardware-assist instructions
Modern processors support hardware-assist instructions (such as TRT and TROT
instructions on IBM zSeries) to accelerate certain functions such as delimiter search and …
instructions on IBM zSeries) to accelerate certain functions such as delimiter search and …
[图书][B] Efficient bytecode verification and compilation in a virtual machine
A Gal - 2006 - dl.acm.org
Applications written in modern dynamic languages such as Java or NET are shipped in the
form of high-level intermediate bytecode. A virtual machine (VM) is used on the target …
form of high-level intermediate bytecode. A virtual machine (VM) is used on the target …
Register allocation with graph coloring by ant colony optimization
CN Lintzmayer, MH Mulati… - 2011 30th International …, 2011 - ieeexplore.ieee.org
The goal of register allocation is to allocate an unbounded number of program values to a
finite number of machine registers. In this paper, we describe a new algorithm for …
finite number of machine registers. In this paper, we describe a new algorithm for …
Optimizing just-in-time compilation in a network of nodes
T Kramp, T Visegrady - US Patent 10,698,708, 2020 - Google Patents
A bytecode construction, a method, and a system for optimizing just in time compilation. The
bytecode includes several regions wherein a region is a logical sequence of one or more …
bytecode includes several regions wherein a region is a logical sequence of one or more …