共 50 条
[41]
Securing Java']Java-Based mobile agents through byte code obfuscation techniques
[J].
10TH IEEE INTERNATIONAL MULTITOPIC CONFERENCE 2006, PROCEEDINGS,
2006,
:305-+
[43]
Java']Java access to numerical libraries
[J].
CONCURRENCY-PRACTICE AND EXPERIENCE,
1997, 9 (11)
:1279-1291
[45]
A scalable location aware service platform for mobile applications based on Java']Java RMI
[J].
TRENDS IN DISTRIBUTED SYSTEMS: TOWARDS A UNIVERSAL SERVICE MARKET,
2000, 1890
:296-301
[46]
Signalling integer overflows in Java']Java - A tool for checking overflows in Java']Java code
[J].
DR DOBBS JOURNAL,
2008, 33 (09)
:54-58
[47]
Minimizing Impact on Java']Java Virtual Machine via JAVA']JAVA Code Optimization
[J].
2015 INTERNATIONAL CONFERENCE ON ENERGY SYSTEMS AND APPLICATIONS,
2015,
:19-24
[49]
On Access Restriction with Java']Java Wildcards
[J].
JOURNAL OF OBJECT TECHNOLOGY,
2005, 4 (10)