Byte code transformations using XSL stylesheets

被引:1
|
作者
Puder, Arno [1 ]
机构
[1] San Francisco State Univ, Dept Comp Sci, San Francisco, CA 94132 USA
关键词
D O I
10.1109/SNPD.2008.164
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Virtual machines (VMs) facilitate the deployment of applications in heterogeneous environments. Popular VMs such as Sun Microsystem's Java VM or Microsoft's Common Language Runtime (CLR) are based on stack-based machines to execute byte code instructions. Implementations of VMs are available for devices like cell phones, personal computers, or chip-cards. It is of obvious economic benefit to be able to map byte code instructions from one VM to the other By doing so, developers for one VM can deploy their applications on the other VM. The CLR offers several features not found in the JVM. The focus of this paper is to map CLR byte code instructions to appropriate JVM instructions using a declarative approach by making extensive use of XML technologies. More specifically, we will show how to use XSL stylesheets to achieve the cross-compilation of CLR byte code instructions to the JVM.
引用
收藏
页码:563 / 568
页数:6
相关论文
共 50 条
  • [21] A Trace Agent with Code No-invasion Based on Byte Code Enhancement Technology
    Wang, Hongrun
    Fang, Wei
    PROCEEDINGS OF 2019 IEEE 10TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2019), 2019, : 405 - 409
  • [22] Portable worst-case execution time analysis using Java']Java Byte Code
    Bernat, G
    Burns, A
    Wellings, A
    EUROMICRO RTS 2000: 12TH EUROMICRO CONFERENCE ON REAL-TIME SYSTEMS, PROCEEDINGS, 2000, : 81 - 88
  • [23] JAVA']JAVA Byte Code File Encryption Research
    Rui, Wang
    FUTURE COMPUTER, COMMUNICATION, CONTROL AND AUTOMATION, 2011, 119 : 629 - 633
  • [24] TWO-BYTE CODE CONVERSION METHOD.
    Hirobe, K.
    Okumura, J.
    IBM technical disclosure bulletin, 1984, 27 (05): : 2969 - 2972
  • [25] Rendering XML documents using XSL
    McGrath, S
    DR DOBBS JOURNAL, 1998, 23 (07): : 82 - +
  • [26] Partial dead code elimination using slicing transformations
    Bodik, R
    Gupta, R
    ACM SIGPLAN NOTICES, 1997, 32 (05) : 159 - 170
  • [27] FOUNDATIONAL CERTIFICATION OF CODE TRANSFORMATIONS USING AUTOMATIC DIFFERENTIATION
    Tadjouddine, Emmanuel M.
    Lv, Wenjin
    COMPUTER SCIENCE-AGH, 2014, 15 (02): : 215 - 236
  • [28] Rendering XML documents using XSL
    Dr Dobb's J Software Tools Prof Program, 7 (82):
  • [29] Locating SQL Injection Vulnerabilities in Java']Java Byte Code using Natural Language Techniques
    Jackson, Kevin A.
    Bennett, Brian T.
    IEEE SOUTHEASTCON 2018, 2018,
  • [30] 81, 64-BYTE ERROR CORRECTION CODE.
    Price, D.W.
    1600, (18):