{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:05:59Z","timestamp":1725537959965},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642046933"},{"type":"electronic","value":"9783642046940"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04694-0_3","type":"book-chapter","created":{"date-parts":[[2009,9,15]],"date-time":"2009-09-15T05:50:17Z","timestamp":1252993817000},"page":"26-39","source":"Crossref","is-referenced-by-count":1,"title":["Type-Separated Bytecode \u2013 Its Construction and Evaluation"],"prefix":"10.1007","author":[{"given":"Philipp","family":"Adler","sequence":"first","affiliation":[]},{"given":"Wolfram","family":"Amme","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/11406921_22","volume-title":"Compiler Construction","author":"A. Le","year":"2005","unstructured":"Le, A., Lhot\u00e1k, O., Hendren, L.: Using inter-procedural side-effect information in JIT optimizations. In: Bodik, R. (ed.) CC 2005. LNCS, vol.\u00a03443, pp. 287\u2013304. Springer, Heidelberg (2005)"},{"key":"3_CR2","series-title":"ACM SIGPLAN Notices","first-page":"187","volume-title":"Proceedings of the Conference on Object-Oriented Programming, Systems, Languages and Applications (OOPSLA 1999)","author":"J. Whaley","year":"1999","unstructured":"Whaley, J., Rinard, M.: Compositional pointer and escape analysis for Java programs. In: Proceedings of the Conference on Object-Oriented Programming, Systems, Languages and Applications (OOPSLA 1999), Denver, CO. ACM SIGPLAN Notices, vol.\u00a034, pp. 187\u2013206. ACM Press, New York (1999)"},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/3-540-46423-9_6","volume-title":"Compiler Construction","author":"D. Gay","year":"2000","unstructured":"Gay, D., Steensgaard, B.: Fast escape analysis and stack allocation for object-based programs. In: Watt, D.A. (ed.) CC 2000. LNCS, vol.\u00a01781, p. 82. Springer, Heidelberg (2000)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Amme, W., von Ronne, J., Franz, M.: SSA-based mobile code: Implementation and empirical evaluation. TACO\u00a04(2) (2007)","DOI":"10.1145\/1250727.1250733"},{"issue":"6","key":"3_CR5","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1002\/1096-9128(200005)12:6<389::AID-CPE481>3.0.CO;2-6","volume":"12","author":"J. Jones","year":"2000","unstructured":"Jones, J., Kamin, S.N.: Annotating Java class files with virtual registers for performance. Concurrency: Practice and Experience\u00a012(6), 389\u2013406 (2000)","journal-title":"Concurrency: Practice and Experience"},{"key":"3_CR6","unstructured":"Yessick, D.E.: Removal of bounds checks in an annotation aware JVM (May 17, 2004)"},{"key":"3_CR7","unstructured":"Franz, M., Krintz, C., Haldar, V., Stork, C.H.: Tamper-proof annotations by construction. Technical Report 02-10, Department of Information and Computer Science, University of California, Irvine (March 2002)"},{"key":"3_CR8","unstructured":"von Ronne, J., Hartmann, A., Amme, W., Franz, M.: Efficient online optimization by utilizing offline analysis and the SafeTSA representation (2002)"},{"issue":"3","key":"3_CR9","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.entcs.2006.06.019","volume":"176","author":"W. Amme","year":"2007","unstructured":"Amme, W., M\u00f6ller, M.A., Adler, P.: Data flow analysis as a general concept for the transport of verifiable program annotations. Electr. Notes Theor. Comput. Sci.\u00a0176(3), 97\u2013108 (2007)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"key":"3_CR10","unstructured":"Amme, W., von Ronne, J., Franz, M.: Using the SafeTSA representation to boost the performance of an existing Java Virtual Machine. In: Proceedings of the 10th International Workshop on Compilers for Parallel Computers (CPC 2003), Amsterdam, Netherland (January 2003)"},{"key":"3_CR11","series-title":"ACM SIGPLAN Notices","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1145\/378795.378825","volume-title":"Proceedings of the Conference on Programming Language Design and Implementation (PLDI 2001)","author":"W. Amme","year":"2001","unstructured":"Amme, W., Dalton, N., Franz, M., von Ronne, J.: SafeTSA: A type safe and referentially secure mobile-code representation based on static single assignment form. In: Proceedings of the Conference on Programming Language Design and Implementation (PLDI 2001), Snowbird, Utah, USA. ACM SIGPLAN Notices, vol.\u00a036, pp. 137\u2013147. ACM Press, New York (2001)"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"von Ronne, J., Wang, N., Apel, A., Franz, M.: A virtual machine for interpreting programs in static single assignment form. Technical Report 03-19, Information and Computer Science, University of California, Irvine (October 2003)","DOI":"10.1145\/1059579.1059585"},{"key":"3_CR13","series-title":"ACM SIGPLAN Notices","first-page":"106","volume-title":"Proceedings of the Symposium on Principles of Programming Languages (POPL 1997)","author":"G.C. Necula","year":"1997","unstructured":"Necula, G.C.: Proof-carrying code. In: Proceedings of the Symposium on Principles of Programming Languages (POPL 1997). ACM SIGPLAN Notices, pp. 106\u2013119. ACM Press, New York (1997)"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Azevedo, A., Nicolau, A., Hummel, J.: Java annotation-aware just-in-time (AJIT) compilation system. In: Proceedings of the Conference on Java Grande (JAVA 1999), pp. 142\u2013151 (1999)","DOI":"10.1145\/304065.304115"},{"key":"3_CR15","series-title":"ACM SIGPLAN Notices","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1145\/378795.378831","volume-title":"Proceedings of the Conference on Programming Language Design and Implementation (PLDI 2001)","author":"C. Krintz","year":"2001","unstructured":"Krintz, C., Calder, B.: Using annotations to reduce dynamic optimization time. In: Proceedings of the Conference on Programming Language Design and Implementation (PLDI 2001). ACM SIGPLAN Notices, vol.\u00a036.5, pp. 156\u2013167. ACM Press, New York (2001)"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/11406921_22","volume-title":"Compiler Construction","author":"A. Le","year":"2005","unstructured":"Le, A., Lhot\u00e1k, O., Hendren, L.J.: Using inter-procedural side-effect information in JIT optimizations. In: Bodik, R. (ed.) CC 2005. LNCS, vol.\u00a03443, pp. 287\u2013304. Springer, Heidelberg (2005)"},{"key":"3_CR17","unstructured":"Rose, E., Rose, K.H.: Lightweight bytecode verification. In: Proceedings of the Workshop on Formal Underpinnings of the Java Paradigm (OOPSLA 1998) (October 1998)"},{"key":"3_CR18","unstructured":"Franz, M., Krintz, C., Haldar, V., Stork, C.H.: Tamper proof annotations. Technical Report 02-10, Department of Information and Computer Science, University of California, Irvine (March 2002)"},{"key":"3_CR19","unstructured":"Hartmann, A., Amme, W., von Ronne, J., Franz, M.: Code annotation for safe and efficient dynamic object resolution. In: Knoop, J., Zimmermann, W. (eds.) Proceedings of the 2nd International Workshop on Compiler Optimization Meets Compiler Verification (COCV 2003), Warsaw, Poland, April 2003, pp. 18\u201332 (2003)"},{"key":"3_CR20","unstructured":"Vall\u00e9e-Rai, R., Gagnon, E., Hendren, L., Lam, P., Pominville, P., Sundaresan, V.: Soot: A Java Optimization Framework (1999), http:\/\/www.sable.mcgill.ca\/soot\/"},{"key":"3_CR21","unstructured":"Sun Microsystems, Inc.: The K Virtual Machine (KVM), http:\/\/java.sun.com\/products\/cldc\/wp\/index.html"},{"key":"3_CR22","unstructured":"Embedded Microprocessor Benchmark Consortium: GrinderBench, http:\/\/www.grinderbench.com\/about.html"},{"key":"3_CR23","unstructured":"Edinburgh Parallel Computing Centre: Java Grande Forum Benchmark Suite, http:\/\/www.epcc.ed.ac.uk\/research\/activities\/java-grande\/"}],"container-title":["Lecture Notes in Computer Science","Runtime Verification"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04694-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T15:25:45Z","timestamp":1685114745000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04694-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642046933","9783642046940"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04694-0_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}