{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:45:01Z","timestamp":1725489901608},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540401612"},{"type":"electronic","value":"9783540448433"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44843-8_59","type":"book-chapter","created":{"date-parts":[[2007,8,15]],"date-time":"2007-08-15T07:42:01Z","timestamp":1187163721000},"page":"542-551","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Optimization Algorithm of Java Bytecode to Reduce Network Traffic"],"prefix":"10.1007","author":[{"given":"Do-Woo","family":"Kim","sequence":"first","affiliation":[]},{"given":"Min-Soo","family":"Jung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,18]]},"reference":[{"key":"59_CR1","doi-asserted-by":"crossref","unstructured":"A. Adl-Tabatabai and M. Cierniak and Huei-Yuan Lueh and V. M. Parikh and J. M. Stichnoth, \u201cFast, Effective Code Generation in a Just-In-Time Java Compiler\u201d, In Proceedings of the ACM SIGPLAN, pp. 280\u2013290, 1998.","DOI":"10.1145\/277652.277740"},{"key":"59_CR2","unstructured":"Aho, A. V., Sethi, R., Ullman, J. D., Compilers: Principles, Techniques, and Tools, Addison-Wesley, 1986."},{"key":"59_CR3","doi-asserted-by":"crossref","unstructured":"A. Taivalsaari, Implementation a Java Virtual Machine in the java programming Language, SUN Lab, 1997.","DOI":"10.1016\/S1353-4858(97)83033-4"},{"key":"59_CR4","doi-asserted-by":"crossref","unstructured":"Appel, A. W., Modern Compiler Implementation in Java, Cambridge University Press, 1998.","DOI":"10.1017\/CBO9781139174930"},{"key":"59_CR5","doi-asserted-by":"crossref","unstructured":"B. Venners, Inside the Java Virtual Machine, McGraw-Hill, 1997.","DOI":"10.1016\/S1353-4858(97)83033-4"},{"key":"59_CR6","unstructured":"Bradly. Q., Horspool. R. N., and Vitek. J., \u201cAn efficient compressed format for Java archive files\u201d, In Proceedings of CASCON\u201998, pp. 294\u2013302, 1998."},{"key":"59_CR7","first-page":"445","volume":"9","author":"Z. Budimlic","year":"1997","unstructured":"Budimlic, Z. Kennedy, K., \u201cOptimizing Java: Theory and practice\u201d, Software: Practice and Experience 9, pp. 445\u2013463, 1997.","journal-title":"Software: Practice and Experience"},{"key":"59_CR8","doi-asserted-by":"crossref","unstructured":"Chow, F., Chan, S., Kennedy, R., Liu, S. M., Lo. R., Tu. P., \u201cA new algorithm for partial redundancy elimination based on SSA form\u201d, In Proceedings of the ACM Conference on Programming Language Design and Implementation. ACM SIGPLAN Notices 32, pp. 273\u2013286. 1997.","DOI":"10.1145\/258916.258940"},{"key":"59_CR9","doi-asserted-by":"crossref","unstructured":"Christian Nester, Michael Philippsen, and Bernhard Haumacher, \u201cA More Efficient RMI for Java\u201d, In Proceedings of ACM 1999 Java Grande Conference, pp. 152\u2013157, 1999.","DOI":"10.1145\/304065.304117"},{"key":"59_CR10","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1002\/(SICI)1096-9128(199706)9:6<427::AID-CPE300>3.0.CO;2-K","volume":"9","author":"M. Cierniak","year":"1997","unstructured":"Cierniak. M. and Li, W., \u201cOptimizing Java bytecodes\u201d, Concurrency: Practice and Experience 9, pp. 427\u2013444, 1997.","journal-title":"Concurrency: Practice and Experience"},{"key":"59_CR11","doi-asserted-by":"publisher","first-page":"1031","DOI":"10.1002\/(SICI)1096-9128(199711)9:11<1031::AID-CPE354>3.0.CO;2-O","volume":"9","author":"L. R. Clausen","year":"1997","unstructured":"Clausen. L. R, \u201cA Java bytecode optimizer using side-effect analysis\u201d, Concurrency: Practice and Experience 9, pp. 1031\u20131045, 1997.","journal-title":"Concurrency: Practice and Experience"},{"key":"59_CR12","unstructured":"Cutts, Q. and Hosking, A. L, \u201cAnalysing, profiling and optimizing orthogonal persistence for Java\u201d, In Proceedings of the Second International Workshop on Persistence and Java, 1997."},{"key":"59_CR13","unstructured":"Gilles Muller, Barbara Moura, Fabrice Bellard, and Charles Consel. Harissa, \u201cA flexible and efficient Java environment mixing bytecode and compiled code\u201d, In Proceedings of the 3 rd Conference on Object-Oriented Technologies and Systems, pp. 1\u201320, 1997."},{"key":"59_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1007\/3-540-45102-1_21","volume-title":"Proceedings of the European Conference on Object-Oriented Programming, Cannes, France, 2000","author":"M. Gupta","year":"2000","unstructured":"Gupta M, Choi J-D, Hind M., \u201cOptimizing Java programs in the presence of exceptions\u201d, In Proceedings of the European Conference on Object-Oriented Programming, Cannes, France, 2000. (Lecture Notes in Computer Science, vol.1850) Bertino E(ed). Springer-Verlag, pp. 422\u2013446, 2000."},{"key":"59_CR15","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1145\/262004.262005","volume":"19","author":"P. Havlak","year":"1997","unstructured":"Havlak, P., \u201cNesting of reducible and irreducible loops\u201d, ACM trans. Program. Lang. Syst. 19, pp. 557\u2013567, 1997.","journal-title":"ACM trans. Program. Lang. Syst."},{"key":"59_CR16","unstructured":"Kuznetsov, E. \u201cOptimizing performance execution with Java\u201d, Java Report, pp. 49\u201351, 1997"},{"key":"59_CR17","doi-asserted-by":"crossref","unstructured":"Lars R. Clausen, Ulrik Pagh Schultz, Charles Consel, and Gilles Muller, \u201cJava Bytecode Compression for Low-End Embedded Systems\u201d, ACM Transactions on Programming Languages and Systems, Vol. 22, No. 3, 2000.","DOI":"10.1145\/353926.353933"},{"key":"59_CR18","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1145\/359060.359069","volume":"1979","author":"E. Morel","year":"1979","unstructured":"Morel E, Renvoise C., \u201cGlobal optimization by suppression of partial redundancies\u201d, Communications of the ACM 1979, pp. 96\u2013103, 1979.","journal-title":"Communications of the ACM"},{"key":"59_CR19","unstructured":"MUCHNICK, S. S., Advanced Compiler Design and Implementation. Morgan Kaufmann, 1997."},{"key":"59_CR20","unstructured":"Nystrom, N., Bytecode level analysis and optimization of java classes, M.S thesis, Purdue University, 1998."},{"key":"59_CR21","doi-asserted-by":"crossref","unstructured":"Pugh W., Fixing the Java memory model. ACM Java Grande Conference, 1999.","DOI":"10.1145\/304065.304106"},{"key":"59_CR22","doi-asserted-by":"crossref","unstructured":"Saurabh Sinha and Mary Jean Harrold, \u201cAnalysis and Twsting of Programs with Exception Handling Constructs\u201d, IEEE Computer Society, Vol. 26, No. 9, 2000.","DOI":"10.1109\/32.877846"},{"key":"59_CR23","unstructured":"T. Lindholm and F. Yellin, The Java \u2122 Virtual Machine Specification ADDISON-WESLEY, 1997."},{"key":"59_CR24","unstructured":"http:\/\/www.artima.com\/ , ARTIMA SOFTWARE COMPANY."},{"key":"59_CR25","unstructured":"http:\/\/java.sun.com\/ , Sun Microsystem, Java Home Page."}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2014 ICCSA 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44843-8_59","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,25]],"date-time":"2020-04-25T21:37:51Z","timestamp":1587850671000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44843-8_59"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540401612","9783540448433"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/3-540-44843-8_59","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}