The SCEAS System
Navigation Menu

Journals in DBLP

Electr. Notes Theor. Comput. Sci.
2005, volume: 141, number: 1

  1. Fausto Spoto
    Preface. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:141, n:1, pp:1- [Journal]
  2. Stephen Gilmore, Matthew Prowse
    Proof-carrying Bytecode. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:141, n:1, pp:3-18 [Journal]
  3. Martin Wildmoser, Amine Chaieb, Tobias Nipkow
    Bytecode Analysis for Proof Carrying Code. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:141, n:1, pp:19-34 [Journal]
  4. Sam Shiel, Ian Bayley
    A Translation-Facilitated Comparison Between the Common Language Runtime and the Java Virtual Machine. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:141, n:1, pp:35-52 [Journal]
  5. Walter Binder, Jarle Hulaas
    Java Bytecode Transformations for Efficient, Portable CPU Accounting. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:141, n:1, pp:53-73 [Journal]
  6. Alex Buckley, Michelle Murray, Susan Eisenbach, Sophia Drossopoulou
    Flexible Bytecode for Linking in .NET. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:141, n:1, pp:75-92 [Journal]
  7. Michael Eichberg
    BAT2XML: XML-based Java Bytecode Representation. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:141, n:1, pp:93-107 [Journal]
  8. Cyrille Artho, Armin Biere
    Subroutine Inlining and Bytecode Abstraction to Simplify Static and Dynamic Analysis. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:141, n:1, pp:109-128 [Journal]
  9. Pierre Crégut, Cuihtlauac Alvarado
    Improving the Security of Downloadable Java Applications With Static Analysis. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:141, n:1, pp:129-144 [Journal]
  10. René Rydhof Hansen, Igor Siveroni
    Towards Verification of Well-Formed Transactions in Java Card Bytecode. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:141, n:1, pp:145-162 [Journal]
  11. Daniel Hedin, David Sands
    Timing Aware Information Flow Security for a JavaCard-like Bytecode. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:141, n:1, pp:163-182 [Journal]
  12. Sigmund Cherem, Radu Rugina
    A Verifier for Region-Annotated Java Bytecodes. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:141, n:1, pp:183-201 [Journal]
  13. Ian Bayley, Sam Shiel
    JVM Bytecode Verification Without Dataflow Analysis. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:141, n:1, pp:203-220 [Journal]
  14. Lucja Kot, Dexter Kozen
    Kleene Algebra and Bytecode Verification. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:141, n:1, pp:221-236 [Journal]
  15. Cinzia Bernardeschi, Giuseppe Lettieri, Luca Martini, Paolo Masci
    A Space-Aware Bytecode Verifier for Java Cards. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:141, n:1, pp:237-254 [Journal]
  16. Fabian Bannwart, Peter Müller
    A Program Logic for Bytecode. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:141, n:1, pp:255-273 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002