共 50 条
- [2] Measurement and analysis of runtime profiling data for Java']Java programs [J]. FIRST IEEE INTERNATIONAL WORKSHOP ON SOURCE CODE ANALYSIS AND MANIPULATION, PROCEEDINGS, 2001, : 122 - 130
- [3] A Detection and Measurement Approach for Memory Leaked Objects in Java']Java Programs [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2015, E98D (05): : 1053 - 1061
- [5] Extracting Visual Contracts from Java']Java Programs [J]. 2015 30TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE), 2015, : 104 - 114
- [6] Changing Java']Java programs [J]. IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS: SYSTEMS AND SOFTWARE EVOLUTION IN THE ERA OF THE INTERNET, 2001, : 479 - 487
- [8] The treewidth of Java']Java programs [J]. ALGORITHM ENGINEERING AND EXPERIMENTS, 2002, 2409 : 86 - 97
- [9] Formal analysis of Java']Java programs in Java']JavaFAN [J]. COMPUTER AIDED VERIFICATION, 2004, 3114 : 501 - 505
- [10] LeakWatch: Estimating Information Leakage from Java']Java Programs [J]. COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 219 - 236