Byte code transformations using XSL stylesheets

被引:1
|
作者
Puder, Arno [1 ]
机构
[1] San Francisco State Univ, Dept Comp Sci, San Francisco, CA 94132 USA
关键词
D O I
10.1109/SNPD.2008.164
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Virtual machines (VMs) facilitate the deployment of applications in heterogeneous environments. Popular VMs such as Sun Microsystem's Java VM or Microsoft's Common Language Runtime (CLR) are based on stack-based machines to execute byte code instructions. Implementations of VMs are available for devices like cell phones, personal computers, or chip-cards. It is of obvious economic benefit to be able to map byte code instructions from one VM to the other By doing so, developers for one VM can deploy their applications on the other VM. The CLR offers several features not found in the JVM. The focus of this paper is to map CLR byte code instructions to appropriate JVM instructions using a declarative approach by making extensive use of XML technologies. More specifically, we will show how to use XSL stylesheets to achieve the cross-compilation of CLR byte code instructions to the JVM.
引用
下载
收藏
页码:563 / 568
页数:6
相关论文
共 50 条
  • [11] Accurate Identification of Internet Video Traffic Using Byte Code Distribution Features
    Xie, Yuxi
    Deng, Hanbo
    Peng, Lizhi
    Chen, Zhenxiang
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT I, 2018, 11334 : 46 - 58
  • [12] Java']Java Archives Search Engine Using Byte Code as Information Source
    Karnalim, Oscar
    Mandala, Rila
    2014 INTERNATIONAL CONFERENCE ON DATA AND SOFTWARE ENGINEERING (ICODSE), 2014,
  • [13] Kava - Using byte code rewriting to add behavioural reflection to Java']Java
    Welch, I
    Stroud, RJ
    6TH USENIX CONFERENCE OF OBJECT-ORIENTED TECHNOLOGIES AND SYSTEMS (COOTS 01), 2001, : 119 - 130
  • [14] Automatic syntiiesis of XSL-transformations from example documents
    Schmid, U
    Waltermann, J
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND APPLICATIONS, VOLS 1AND 2, 2004, : 252 - 257
  • [15] Distributed partial evaluation on byte code specialization
    Ni, ZM
    Mao, HY
    Huang, LP
    Sun, YQ
    Current Trends in High Performance Computing and Its Applications, Proceedings, 2005, : 399 - 402
  • [16] Restructuring Assembly Code Using Formal Transformations
    Pracner, Doni
    Budimac, Zoran
    NUMERICAL ANALYSIS AND APPLIED MATHEMATICS ICNAAM 2011: INTERNATIONAL CONFERENCE ON NUMERICAL ANALYSIS AND APPLIED MATHEMATICS, VOLS A-C, 2011, 1389
  • [17] OPTIMAL CODE PARALLELIZATION USING UNIMODULAR TRANSFORMATIONS
    DOWLING, ML
    PARALLEL COMPUTING, 1990, 16 (2-3) : 157 - 171
  • [18] Preventing reverse engineering threat in Java']Java using byte code obfuscation techniques
    Memon, Jan M.
    Shams-ul-Arfeen
    Mughal, Asghar
    Memon, Faisal
    SECOND INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES 2006, PROCEEDINGS, 2006, : 689 - +
  • [19] Using XSLT stylesheets to transform XPath queries
    Groppe, S
    Böttcher, S
    Heckel, R
    Birkenheuer, G
    ADBIS' 04: EIGHTH EAST-EUROPEAN CONFERENCE ON ADVANCES IN DATABASES AND INFORMATION SYSTEMS, PROCEEDINGS, 2004, : 48 - 63
  • [20] Improving Evolution of XSLT Stylesheets Using Heuristic Operators
    Garcia-Sanchez, P.
    Merelo, J. J.
    Laredo, J. L. J.
    Mora, A. M.
    Castillo, P. A.
    INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE 2008, 2009, 50 : 161 - 170