Filters








68,583 Hits in 2.7 sec

Byte Code Engineering [chapter]

Markus Dahm
1999 JIT'99  
Several research projects deal with byte code-generating compilers or the implementation of new features via byte code transformations.  ...  Therefore, we have developed a general purpose framework for the static analysis and dynamic creation or transformation of byte code.  ...  The above applied code constraint object ensures that the matched code really can be transformed, i.e. it checks the targets of the branch instructions: Concepts of Byte Code Engineering Byte code engineering  ... 
doi:10.1007/978-3-642-60247-4_25 dblp:conf/jit/Dahm99 fatcat:uybehbtlrndptihrjcraby6kdu

Effective identification of source code authors using byte-level information

Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Sokratis Katsikas
2006 Proceeding of the 28th international conference on Software engineering - ICSE '06  
We present a new approach, called the SCAP (Source Code Author Profiles) approach, based on byte-level n-gram profiles in order to represent a source code author's style.  ...  able to capture the idiosyncrasies of the source code authors.  ...  CONCLUSIONS In this paper, the SCAP approach to source code authorship analysis has been presented. It is based on byte-level n-gram profiles.  ... 
doi:10.1145/1134285.1134445 dblp:conf/icse/FrantzeskouSGK06 fatcat:p4ik5yfvvzdktmeyit555rpuaq

N-BYTE ERROR DETECTING AND CORRECTING CODE USING REED-SOLOMON AND CELLULAR AUTOMATA APPROACH

Parul Gaur .
2012 International Journal of Research in Engineering and Technology  
Cellular automata already accepted as an attractive structure for error detecting and correcting codes.  ...  The design is capable of adding 2N check bytes corresponding to N information bytes at the encoder, which are used at the decoder section to detect and correct the byte errors.  ...  MECHANISM FOR CA BASED N-BYTE ERROR DETECTING AND CORRECTING CODE A. Encoder Section In encoder, check bytes are added.  ... 
doi:10.15623/ijret.2012.0103052 fatcat:5jblv6qa6fcahgwd3y2fqsi53m

A Study on Development of Engine Fault Diagnostic System

Hwa-seon Kim, Seong-jin Jang, Jong-wook Jang
2015 Mathematical Problems in Engineering  
It transmits 31 pieces of engine condition information simultaneously and sends the trouble diagnostic code.  ...  only for industrial CRDI engine use.  ...  If the response message is ACK(0x06) and the checksum value is 0x00, 31 automotive data of 130 bytes are finally saved. Algorithm for Obtaining Engine Diagnostic Code.  ... 
doi:10.1155/2015/271374 fatcat:lae4teikjja4nftnvognz3t5h4

Advanced control flow in Java card programming

Peng Li, Steve Zdancewic
2004 SIGPLAN notices  
High complexity in code maintanence Lack of software engineering principles: abstraction and encapsulation.  ...  High complexity in code maintanence Suppose we have 20 control states... Lack of software engineering principles: abstraction and encapsulation.  ... 
doi:10.1145/998300.997187 fatcat:rxqa6m3jongyleogg3kixhmkgi

An Internet of Vehicles System for Remote Monitoring and Fault Diagnosis of Automobiles

Guoyou Gao, Chunsheng Jiang, Tao Chen, Chun Hui, Lina Wu, Hao Huang
2017 Journal of Automation and Control Engineering  
19~32 Data generation time 14 Byte 33~34 Maximum engine speed 2 Byte 35~36 Minimum engine speed 2 Byte 37~38 Maximum speed 2 Byte 39~40 Average speed 2 Byte 41~42 Mileage 2 Byte  ...  19~35 GPS information 16 Byte 36~38 Battery voltage(VBAT) 2 Byte 39~40 Engine speed(RPM) 2 Byte 41~42 Vehicle speed(SPD) 2 Byte 43~44 Throttle opening(TP) 2 Byte 45~46 Engine load(LOD)  ... 
doi:10.18178/joace.6.1.47-52 fatcat:6gs37xn3cjgxnolz7i6e75bute

Advanced control flow in Java card programming

Peng Li, Steve Zdancewic
2004 Proceedings of the 2004 ACM SIGPLAN/SIGBED conference on Languages, compilers, and tools - LCTES '04  
High complexity in code maintanence Lack of software engineering principles: abstraction and encapsulation.  ...  High complexity in code maintanence Suppose we have 20 control states... Lack of software engineering principles: abstraction and encapsulation.  ... 
doi:10.1145/997163.997187 dblp:conf/lctrts/LiZ04 fatcat:jnwd6bghlfelxezmrjroysjsmq

OCamlJIT 2.0 - Faster Objective Caml [article]

Benedikt Meurer
2011 arXiv   pre-print
This paper presents the current state of an ongoing research project to improve the performance of the OCaml byte-code interpreter using Just-In-Time native code generation.  ...  Our JIT engine OCamlJIT2 currently runs on x86-64 processors, mimicing precisely the behavior of the OCaml virtual machine.  ...  in the context of a JIT engine.  ... 
arXiv:1011.1783v3 fatcat:mywv6pfqkbhbtn5zd43ptt6pfq

A Parallelization Design of JavaScript Execution Engine

Duan Hucai, Ni Hong, Deng Feng, Hu Linlin
2014 International Journal of Multimedia and Ubiquitous Engineering  
Moreover, the parallel JavaScript execution engine with thread-level speculation technology is implemented based on the SquirrelFish Extreme engine of WebKit.  ...  with 2 to 16 threads can raise the performance dramatically compared with a SquirrelFish execution engine with or without JIT acceleration, respectively.  ...  Squirrelfish Extreme execution engine first translates JavaScript source codes into byte codes [18] , partitions serial JavaScript program into several tasks in the process of byte-code generation and  ... 
doi:10.14257/ijmue.2014.9.7.15 fatcat:oaiy246csjb43injthzs35nive

Just-In-Time compilation of OCaml byte-code [article]

Benedikt Meurer
2011 arXiv   pre-print
This paper presents various improvements that were applied to OCamlJIT2, a Just-In-Time compiler for the OCaml byte-code virtual machine.  ...  Figure 6 shows the performance of the byte-code interpreter and the JIT engines relative to the optimizing native code compiler ocamlopt.  ...  Figure 5 highlights the speedup of the JIT engines relative to the byte-code interpreter on the three test systems.  ... 
arXiv:1011.6223v3 fatcat:lqvq2d43t5cpham5w3u7exe5ty

PUMA EDFplus Engine [article]

Johannes W. Dietrich
2018 Zenodo  
PUMA's EDFplus engine is an Object Pascal library that supports reading, writing, parsing and composing multichannel biological and physical signals in the European Data Format (EDF) or its successor EDF  ...  TEDFDoc.StatusCode delivers the status code for the last operation of the engine.  ...  Status codes are standardised for all units of the PUMA EDF+ engine (and to some extent correspond among all PUMA packages).  ... 
doi:10.5281/zenodo.1476207 fatcat:qkqb6ip3r5fr7dd3vkzyduiafa

AOC: An Aspect - Oriented Approach for Comment to Reduce the Redundant Behavior between Source Code and Compilation Code

Siwadol Sateanpattanakul
2015 Journal of Software  
The program behaviors exist in two places, source code and machine code. They make repetition of the software engineering process.  ...  Compiler has the duty to transform the source code to machine code. After the compilation process, there are two types of file was be appear as the former source code and the byte code.  ...  Fig. 5 . 5 Transforming from source code to byte code; Fig. 5a. (left) represent Java source code; Fig. 5b. (middle) represent byte code; Fig. 5c.  ... 
doi:10.17706/jsw.10.12.1336-1342 fatcat:5rduwqskzva7bewfqjqkrpamdq

Implementation Of A Reed-Solomon Code As An Ecc In Yet Another Flash File System

Sungjoon Sim, Soongyu Kwon, Dongjae Song, Jong Tae Kim
2010 Zenodo  
RS code has longer computing time but the correcting ability is much higher than that of Hamming code.  ...  To correct more errors for MLC, we implement Reed-Solomon (RS) code to YAFFS, what is widely used for flash-based file system.  ...  In the same way, from 256 to 511 byte number of data handle and parity symbols are stored in ECC3-5 because YAFFS code is built to handle 256 bytes of a page at once.  ... 
doi:10.5281/zenodo.1083656 fatcat:njlcppyw2vdnjiatwbv4wqnon4

Page 847 of IEEE Transactions on Computers Vol. 52, Issue 7 [page]

2003 IEEE Transactions on Computers  
CORRECTING AND SINGLE BYTE ERROR 847 A General Class of Maximal Codes for 12 4] S.J.  ...  Y 200: This b, the h are Radian ‘le Bits ductor endal Erro abilit _no. 2 MIT 4 Byte ode ir vol. 5 d Byte , no. 5 i Tro C ode , no. 1 UMANESAN AND FUJIWARA: A CLASS OF RANDOM MULTIPLE BITS IN A BYTE ERROR  ... 

Using instruction sequence abstraction for shellcode detection and attribution

Ziming Zhao, Gail-Joon Ahn
2013 2013 IEEE Conference on Communications and Network Security (CNS)  
Misuse-based detection lacks the flexibility to tackle unseen malicious code samples and anomaly-based detection on byte patterns is highly vulnerable to byte cramming and blending attacks.  ...  Although several research teams have focused on binary code injection, it is still an unsolved problem.  ...  While most of these work focus on the byte patterns identified in binary code, Song et al.  ... 
doi:10.1109/cns.2013.6682722 dblp:conf/cns/ZhaoA13 fatcat:6ecodcbyxneqzmoqum3g7atimi
« Previous Showing results 1 — 15 out of 68,583 results