PicoJava']Java: A direct execution engine for Java']Java bytecode

被引:66
作者
McGhan, H [1 ]
O'Connor, M [1 ]
机构
[1] Sun Microsyst Inc, Microelect Div, Palo Alto, CA 94303 USA
关键词
D O I
10.1109/2.722273
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Key to the central promise inherent in Java technology-"write once, run anywhere"-is the fact that Java programs run on the Java virtual machine, insulating them from any contact with the underlying hardware. Consequently, Java programs must execute indirectly through a translation layer built into the Java virtual machine. Translation essentially converts Java virtual machine instructions (called bytecodes) into corresponding machine-specific binary instructions. Bytecode is a single image of a program that will execute identically (in principle) on any system equipped with a JVM. The first step toward the development of a new class of Java processors was the creation of the bytecode execution engine itself, called the picoJava core. PicoJava directly executes Java bytecode instructions and provides hardware support for other essential functions of the JVM. Executing bytecode instructions in hardware eliminates the need for dynamic translation, thus extending the useful range of Java bytecode programs to embedded environments. By the end of 1998, Java processors like Sun's microJava 701 should be available for evaluation from several licensees of the picoJava core technology.
引用
收藏
页码:22 / +
页数:10
相关论文
共 50 条
[31]   An Evaluation of Current Java']Java Bytecode Decompilers [J].
Hamilton, James ;
Danicic, Sebastian .
2009 NINTH IEEE INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION, PROCEEDINGS, 2009, :129-136
[32]   Advanced obfuscation techniques for Java']Java bytecode [J].
Chan, JT ;
Yang, W .
JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 71 (1-2) :1-10
[33]   An Evaluation of Static Java']Java Bytecode Watermarking [J].
Hamilton, James ;
Danicic, Sebastian .
WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, VOLS 1 AND 2, 2010, :1-8
[34]   Heap Space Analysis for Java']Java Bytecode [J].
Albert, Elvira ;
Genaim, Samir ;
Gomez-Zamalloa, Miguel .
ISMM'07: PROCEEDINGS OF THE 2007 INTERNATIONAL SYMPOSIUM ON MEMORY MANAGEMENT, 2007, :105-+
[35]   Path Executions of Java']Java Bytecode Programs [J].
Soomro, Safeeullah ;
Alansari, Zainab ;
Belgaum, Mohammad Riyaz .
PROGRESS IN ADVANCED COMPUTING AND INTELLIGENT ENGINEERING, VOL 2, 2018, 564 :261-271
[36]   Abstract Interpretation of Java']Java Bytecode in Sturdy [J].
Marx, Stefan ;
Erdweg, Sebastian .
PROCEEDINGS OF THE 26TH ACM INTERNATIONAL WORKSHOP ON FORMAL TECHNIQUES FOR JAVA-LIKE PROGRAMS, FTFJP 2024, 2024, :17-22
[37]   Extending operational semantics of the Java']Java bytecode [J].
Czarnik, Patryk ;
Schubert, Aleksy .
TRUSTWORTHY GLOBAL COMPUTING, 2008, 4912 :57-72
[38]   A type system for Java']Java bytecode subroutines [J].
Stata, R ;
Abadi, M .
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1999, 21 (01) :90-137
[39]   Java']Java bytecode verification for @NonNull types [J].
Male, Chris ;
Pearce, David J. ;
Potanin, Alex ;
Dymnikov, Constantine .
COMPILER CONSTRUCTION, 2008, 4959 :229-244
[40]   Bytecode verification on Java']Java smart cards [J].
Leroy, X .
SOFTWARE-PRACTICE & EXPERIENCE, 2002, 32 (04) :319-340