Zobrazeno 1 - 10
of 2 401
pro vyhledávání: '"bytecode"'
Publikováno v:
IEEE Access, Vol 12, Pp 56847-56859 (2024)
Software maintenance takes up a disproportionately large amount of time in the modern software life cycle. One of the common problems is understanding the original code that is being restructured and improved and this is especially true with low-leve
Externí odkaz:
https://doaj.org/article/3b0fb6d98110473fb5c6dd03247d5ff3
Autor:
Li Zhenhao, Lei Hang
Publikováno v:
Applied Mathematics and Nonlinear Sciences, Vol 9, Iss 1 (2024)
In order to perform code clone detection in missing source code scenarios while ensuring the code clone detection effect, this paper proposes a code clone detection method based on bytecode and twin neural networks. The process begins by extracting t
Externí odkaz:
https://doaj.org/article/ecac2ca497c94c8986d5ef8917f7b93b
Publikováno v:
网络与信息安全学报, Vol 8, Pp 111-120 (2022)
In recent years, blockchain technology has been widely used and concerned in many fields, including finance, medical care and government affairs.However, due to the immutability of smart contracts and the particularity of the operating environment, v
Externí odkaz:
https://doaj.org/article/1cace43b42574bf295ab69b23899247e
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Anna Antipina
Publikováno v:
Современные информационные технологии и IT-образование, Vol 17, Iss 3, Pp 613-624 (2021)
This article discusses the problem of automatic generation of peephole-optimization of the static bytecode optimizer of a virtual machine (VM) concerning the task of improving the instruction set architecture (ISA) of the VM. Peephole optimization is
Externí odkaz:
https://doaj.org/article/d5dc0f9b654149d6bcc33a34dec52470
Publikováno v:
Applied Sciences, Vol 13, Iss 17, p 9580 (2023)
Code clone detection is an important research topic in the field of software engineering. It is significant in developing software and solving software infringement disputes to discover code clone phenomenon effectively in and between software system
Externí odkaz:
https://doaj.org/article/01ad4f5774e04d3e8347d3fbc66cbe6c
Publikováno v:
Tongxin xuebao, Vol 42, Pp 171-181 (2021)
To solve the abuse of the Android application permission mechanism, a method of Android application access control based on virtual machine bytecode injection technology was proposed.The security policy in the form of virtual machine bytecode was gen
Externí odkaz:
https://doaj.org/article/641f24f6a24249698ee129b40675deba
Publikováno v:
IEEE Access, Vol 7, Pp 22421-22433 (2019)
When the source code is copied and pasted or modified, there will be a lot of identical or similar code snippets in the software system, which are called code clones. Because code clones are believed to result in undesirable maintainability of softwa
Externí odkaz:
https://doaj.org/article/2d0e5922688f4ac3b9965333ffae2f9e
Autor:
Tomaž DOBRAVEC
Publikováno v:
Acta Electrotechnica et Informatica, Vol 18, Iss 4, Pp 17-25 (2019)
Development of algorithms for solving various kinds of computer related problems consists of several consecutive and possibly repetitive phases. The final and very important step in this process is to implement the developed algorithm in a selected
Externí odkaz:
https://doaj.org/article/b2bf7a8d80fa4f4a8890b04d97990146
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.