Journal: Electronic Notes in Theoretical Computer Science

Volume 253, Issue 5

1 -- 2Elvira Albert, Samir Genaim. Preface
3 -- 14Stefan Brunthaler. Virtual-Machine Abstraction and Optimization Techniques
15 -- 30Laurent Hubert, David Pichardie. Soundly Handling Static Fields: Issues, Semantics and Analysis
31 -- 46Xin Li, Mizuhito Ogawa. An Ahead-of-time Yet Context-Sensitive Points-to Analysis for Java
47 -- 64Phil McGachey, Antony L. Hosking, J. Eliot B. Moss. Pervasive Load-Time Transformation for Transparently Distributed Java
65 -- 82Jorge Navas, Mario Méndez-Lojo, Manuel V. Hermenegildo. User-Definable Resource Usage Bounds Analysis for Java Bytecode
83 -- 96Étienne Payet, Fausto Spoto. Experiments with Non-Termination Analysis for Java Bytecode
97 -- 111Arno Puder, Jessica Lee. Towards an XML-based Bytecode Level Transformation Framework
113 -- 127Aleksy Schubert, Daria Walukiewicz-Chrzaszcz. The Non-Interference Protection in BML
129 -- 144Fausto Spoto, Lunjin Lu, Fred Mesnard. Using CLP Simplifications to Improve Java Bytecode Termination Analysis
145 -- 151Massimo Bartoletti, Gabriele Costa, Roberto Zunino. Jalapa: Securing Java with Local Policies: Tool Demonstration
153 -- 159Lieven Desmet, Wouter Joosen, Fabio Massacci, Katsiaryna Naliuka, Pieter Philippaerts, Frank Piessens, Dries Vanoverberghe. The S3MS.NET Run Time Monitor: Tool Demonstration