Byte code transformations using XSL stylesheets

被引:1
|
作者
Puder, Arno [1 ]
机构
[1] San Francisco State Univ, Dept Comp Sci, San Francisco, CA 94132 USA
关键词
D O I
10.1109/SNPD.2008.164
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Virtual machines (VMs) facilitate the deployment of applications in heterogeneous environments. Popular VMs such as Sun Microsystem's Java VM or Microsoft's Common Language Runtime (CLR) are based on stack-based machines to execute byte code instructions. Implementations of VMs are available for devices like cell phones, personal computers, or chip-cards. It is of obvious economic benefit to be able to map byte code instructions from one VM to the other By doing so, developers for one VM can deploy their applications on the other VM. The CLR offers several features not found in the JVM. The focus of this paper is to map CLR byte code instructions to appropriate JVM instructions using a declarative approach by making extensive use of XML technologies. More specifically, we will show how to use XSL stylesheets to achieve the cross-compilation of CLR byte code instructions to the JVM.
引用
收藏
页码:563 / 568
页数:6
相关论文
共 50 条
  • [41] Verification of Atomicity Preservation in Model-to-Code Transformations using Generic Java']Java Code
    Zhang, Dan
    Bosnacki, Dragan
    van den Brand, Mark
    Huizing, Cornelis
    Kuiper, Ruurd
    Jacobs, Bart
    Wijs, Anton
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MODEL-DRIVEN ENGINEERING AND SOFTWARE DEVELOPMENT (MODELSWARD 2016), 2016, : 578 - 588
  • [42] Natural Language Processing Model Compiling Natural Language into Byte Code
    Trifan, Alexandru
    Anghelus, Marilena
    Constantinescu, Rodica
    2017 INTERNATIONAL CONFERENCE ON SPEECH TECHNOLOGY AND HUMAN-COMPUTER DIALOGUE (SPED), 2017,
  • [43] Combinatorial Validation Testing of Java']Java Card Byte Code Verifiers
    Calvagna, Andrea
    Tramontana, Emiliano
    2013 IEEE 22ND INTERNATIONAL WORKSHOP ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2013, : 347 - 352
  • [44] Generating control flow graph from Java card byte code
    Ibn Tofail University, Laboratory XLIM Secure Smart Devices, University of Limoges, France
    Colloq. Inform. Sci. Technol., CIST, January (206-212):
  • [45] BYTE-WIDE ECC/CRC CODE AND SYNDROME CALCULATOR.
    Anon
    IBM technical disclosure bulletin, 1986, 29 (05): : 2141 - 2145
  • [46] Code Shredding: Byte-Granular Randomization of Program Layout for Detecting Code-Reuse Attacks
    Shioji, Eitaro
    Kawakoya, Yuhei
    Iwamura, Makoto
    Hariu, Takeo
    28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), 2012, : 309 - 318
  • [47] Jumble Java']Java byte code to measure the effectiveness of unit tests
    Irvine, Sean A.
    Pavlinic, Tin
    Trigg, Leonard
    Cleary, John G.
    Inglis, Stuart
    Utting, Mark
    TAIC PART 2007 - TESTING: ACADEMIC AND INDUSTRIAL CONFERENCE - PRACTICE AND RESEARCH TECHNIQUES, PROCEEDINGS: CO-LOCATED WITH MUTATION 2007, 2007, : 169 - +
  • [48] Method and its system of Java source and byte code plagiarism detection
    Li, Hu
    Liu, Chao
    Liu, Nan
    Li, Xiaoli
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2010, 36 (04): : 424 - 428
  • [49] Byte code level cross-compilation for developing web applications
    Puder, Arno
    Haeberling, Sascha
    SCIENCE OF COMPUTER PROGRAMMING, 2009, 74 (5-6) : 379 - 396
  • [50] Parallel decoder for cellular automata based byte error correcting code
    Chattopadhyay, S
    Chaudhuri, PP
    TENTH INTERNATIONAL CONFERENCE ON VLSI DESIGN, PROCEEDINGS, 1997, : 527 - 528