1 | -- | 2 | Elvira Albert, Samir Genaim. Preface |
3 | -- | 14 | Stefan Brunthaler. Virtual-Machine Abstraction and Optimization Techniques |
15 | -- | 30 | Laurent Hubert, David Pichardie. Soundly Handling Static Fields: Issues, Semantics and Analysis |
31 | -- | 46 | Xin Li, Mizuhito Ogawa. An Ahead-of-time Yet Context-Sensitive Points-to Analysis for Java |
47 | -- | 64 | Phil McGachey, Antony L. Hosking, J. Eliot B. Moss. Pervasive Load-Time Transformation for Transparently Distributed Java |
65 | -- | 82 | Jorge Navas, Mario Méndez-Lojo, Manuel V. Hermenegildo. User-Definable Resource Usage Bounds Analysis for Java Bytecode |
83 | -- | 96 | Étienne Payet, Fausto Spoto. Experiments with Non-Termination Analysis for Java Bytecode |
97 | -- | 111 | Arno Puder, Jessica Lee. Towards an XML-based Bytecode Level Transformation Framework |
113 | -- | 127 | Aleksy Schubert, Daria Walukiewicz-Chrzaszcz. The Non-Interference Protection in BML |
129 | -- | 144 | Fausto Spoto, Lunjin Lu, Fred Mesnard. Using CLP Simplifications to Improve Java Bytecode Termination Analysis |
145 | -- | 151 | Massimo Bartoletti, Gabriele Costa, Roberto Zunino. Jalapa: Securing Java with Local Policies: Tool Demonstration |
153 | -- | 159 | Lieven Desmet, Wouter Joosen, Fabio Massacci, Katsiaryna Naliuka, Pieter Philippaerts, Frank Piessens, Dries Vanoverberghe. The S3MS.NET Run Time Monitor: Tool Demonstration |