Java Byte Code

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 558 Experts worldwide ranked by ideXlab platform

G. Bernat - One of the best experts on this subject based on the ideXlab platform.

  • Symposium on Object-Oriented Real-Time Distributed Computing - Java virtual-machine support for portable worst-case execution-time analysis
    Proceedings Fifth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing. ISIRC 2002, 2002
    Co-Authors: L. Bate, G. Bernat, P. Puschner
    Abstract:

    The current trend towards the usage of Java in real-time, supported by two specifications (Real-Time Java and Real-Time Core extensions for the Java platform) requires adequate schedulability analysis, and consequently, worst case execution time (WCET) analysis techniques for the Java platform. This paper proposes a framework for providing portable WCET analysis for the Java platform. Portability means that the analysis is language and hardware independent. It is achieved by, separating the WCET analysis process in three stages and by analysing the Java Byte Code, not the high-level source Code, thus enabling the analysis of programs written in other languages (such as Ada and compiled for the Java virtual machine). The three stages are: a Java virtual machine platform dependent (low-level) analysis, a software dependent (high-level) analysis and an on-line integration step.

  • Java virtual-machine support for portable worst-case execution-time analysis
    Proceedings Fifth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing. ISIRC 2002, 2002
    Co-Authors: L. Bate, G. Bernat, P. Puschner
    Abstract:

    The current trend towards the usage of Java in real-time, supported by two specifications (Real-Time Java and Real-Time Core extensions for the Java platform) requires adequate schedulability analysis, and consequently, worst case execution time (WCET) analysis techniques for the Java platform. This paper proposes a framework for providing portable WCET analysis for the Java platform. Portability means that the analysis is language and hardware independent. It is achieved by, separating the WCET analysis process in three stages and by analysing the Java Byte Code, not the high-level source Code, thus enabling the analysis of programs written in other languages (such as Ada and compiled for the Java virtual machine). The three stages are: a Java virtual machine platform dependent (low-level) analysis, a software dependent (high-level) analysis and an on-line integration step.

  • RTCSA - Low-level analysis of a portable Java Byte Code WCET analysis framework
    Proceedings Seventh International Conference on Real-Time Computing Systems and Applications, 2000
    Co-Authors: I. Bate, G. Bernat, G. Murphy, P. Puschner
    Abstract:

    To support portability, worst-case execution time (WCET) analysis of Java Byte Code is performed at two levels - machine-independent program flow analysis at a higher level and machine-dependent timing analysis of individual program constructs at a lower level. This paper contributes a WCET analysis that computes worst-case execution frequencies of Java Byte Codes within the software being analysed and accounts for platform-dependent information, i.e. the processor's pipeline. The main part of the approach is platform-independent; only a limited analysis is needed on a per-platform basis.

  • Portable worst-case execution time analysis using Java Byte Code
    Proceedings 12th Euromicro Conference on Real-Time Systems. Euromicro RTS 2000, 2000
    Co-Authors: G. Bernat, A. Burns, A. Wellings
    Abstract:

    Addresses the problem of performing worst-case execution time (WCET) analysis of Java Byte Code (JBC), which may be generated from different compilers and from different source languages. The motivation for the framework presented is to provide WCET analysis which is portable and therefore more likely to be used in an industrial context. Two issues are addressed in this paper: how to extract data flow and control flow information from JBC programs, and how to provide a compiler-/language-independent mechanism to introduce WCET annotations in the source Code. We show that an annotation mechanism based on calls to a static class with empty methods result in similar Code when generated by Java or Ada compilers.

  • ECRTS - Portable worst-case execution time analysis using Java Byte Code
    Proceedings 12th Euromicro Conference on Real-Time Systems. Euromicro RTS 2000, 2000
    Co-Authors: G. Bernat, A. Burns, A. Wellings
    Abstract:

    Addresses the problem of performing worst-case execution time (WCET) analysis of Java Byte Code (JBC), which may be generated from different compilers and from different source languages. The motivation for the framework presented is to provide WCET analysis which is portable and therefore more likely to be used in an industrial context. Two issues are addressed in this paper: how to extract data flow and control flow information from JBC programs, and how to provide a compiler-/language-independent mechanism to introduce WCET annotations in the source Code. We show that an annotation mechanism based on calls to a static class with empty methods result in similar Code when generated by Java or Ada compilers.

Wuwei Shen - One of the best experts on this subject based on the ideXlab platform.

  • Improving the Accuracy of UML Class Model Recovery
    31st Annual International Computer Software and Applications Conference (COMPSAC 2007), 2007
    Co-Authors: Kun Wang, Wuwei Shen
    Abstract:

    The gap between UML class models and their implementations impedes program understanding and analysis, and is a source of program errors. Although many reverse engineering techniques were proposed to bridge this gap, two major problems still exist. First, the accuracy of association inference from container classes is not adequate without considering iterators. Second, associations implemented by inherited fields are missed by existing techniques. In this paper, we present an approach to precisely and automatically recover a class model from Java Byte Code. Our approach tackles the above problems and improves the accuracy of the recovered models. The preliminary empirical results show that our approach achieved a higher accuracy for association inference than existing reverse engineering tools.

  • COMPSAC (1) - Improving the Accuracy of UML Class Model Recovery
    31st Annual International Computer Software and Applications Conference - Vol. 1- (COMPSAC 2007), 2007
    Co-Authors: Kun Wang, Wuwei Shen
    Abstract:

    The gap between UML class models and their implementations impedes program understanding and analysis, and is a source of program errors. Although many reverse engineering techniques were proposed to bridge this gap, two major problems still exist. First, the accuracy of association inference from container classes is not adequate without considering iterators. Second, associations implemented by inherited fields are missed by existing techniques. In this paper, we present an approach to precisely and automatically recover a class model from Java Byte Code. Our approach tackles the above problems and improves the accuracy of the recovered models. The preliminary empirical results show that our approach achieved a higher accuracy for association inference than existing reverse engineering tools.

Harald Vogt - One of the best experts on this subject based on the ideXlab platform.

A. Wellings - One of the best experts on this subject based on the ideXlab platform.

  • Portable worst-case execution time analysis using Java Byte Code
    Proceedings 12th Euromicro Conference on Real-Time Systems. Euromicro RTS 2000, 2000
    Co-Authors: G. Bernat, A. Burns, A. Wellings
    Abstract:

    Addresses the problem of performing worst-case execution time (WCET) analysis of Java Byte Code (JBC), which may be generated from different compilers and from different source languages. The motivation for the framework presented is to provide WCET analysis which is portable and therefore more likely to be used in an industrial context. Two issues are addressed in this paper: how to extract data flow and control flow information from JBC programs, and how to provide a compiler-/language-independent mechanism to introduce WCET annotations in the source Code. We show that an annotation mechanism based on calls to a static class with empty methods result in similar Code when generated by Java or Ada compilers.

  • ECRTS - Portable worst-case execution time analysis using Java Byte Code
    Proceedings 12th Euromicro Conference on Real-Time Systems. Euromicro RTS 2000, 2000
    Co-Authors: G. Bernat, A. Burns, A. Wellings
    Abstract:

    Addresses the problem of performing worst-case execution time (WCET) analysis of Java Byte Code (JBC), which may be generated from different compilers and from different source languages. The motivation for the framework presented is to provide WCET analysis which is portable and therefore more likely to be used in an industrial context. Two issues are addressed in this paper: how to extract data flow and control flow information from JBC programs, and how to provide a compiler-/language-independent mechanism to introduce WCET annotations in the source Code. We show that an annotation mechanism based on calls to a static class with empty methods result in similar Code when generated by Java or Ada compilers.

Kun Wang - One of the best experts on this subject based on the ideXlab platform.

  • Improving the Accuracy of UML Class Model Recovery
    31st Annual International Computer Software and Applications Conference (COMPSAC 2007), 2007
    Co-Authors: Kun Wang, Wuwei Shen
    Abstract:

    The gap between UML class models and their implementations impedes program understanding and analysis, and is a source of program errors. Although many reverse engineering techniques were proposed to bridge this gap, two major problems still exist. First, the accuracy of association inference from container classes is not adequate without considering iterators. Second, associations implemented by inherited fields are missed by existing techniques. In this paper, we present an approach to precisely and automatically recover a class model from Java Byte Code. Our approach tackles the above problems and improves the accuracy of the recovered models. The preliminary empirical results show that our approach achieved a higher accuracy for association inference than existing reverse engineering tools.

  • COMPSAC (1) - Improving the Accuracy of UML Class Model Recovery
    31st Annual International Computer Software and Applications Conference - Vol. 1- (COMPSAC 2007), 2007
    Co-Authors: Kun Wang, Wuwei Shen
    Abstract:

    The gap between UML class models and their implementations impedes program understanding and analysis, and is a source of program errors. Although many reverse engineering techniques were proposed to bridge this gap, two major problems still exist. First, the accuracy of association inference from container classes is not adequate without considering iterators. Second, associations implemented by inherited fields are missed by existing techniques. In this paper, we present an approach to precisely and automatically recover a class model from Java Byte Code. Our approach tackles the above problems and improves the accuracy of the recovered models. The preliminary empirical results show that our approach achieved a higher accuracy for association inference than existing reverse engineering tools.