bytecode


Also found in: Dictionary, Thesaurus, Financial, Wikipedia.

bytecode

[′bīt‚kōd]
(computer science)
Compiled Java programs that can be transferred across a network and executed by the Java virtual machine.
McGraw-Hill Dictionary of Scientific & Technical Terms, 6E, Copyright © 2003 by The McGraw-Hill Companies, Inc.
References in periodicals archive ?
It Worked in an automated manner and could also optimize bytecode without requiring the source code.
Java Tercero Se puede lograr por medio de la API BCEL (BCEL, 2013; APACHE-a, 2013; APACHE-b, 2013) la cual permite incorporar codigo al BYTECODE. Perl Primero Perl ofrece de forma nativa metodos de reflexion esenciales (Warden, 2012).
Code written in haXe can be converted to source code (or bytecode) for Flash (for both AVM1, or Flash 6 to 8; and AVM2, Flash 9 onwards), Neko, PHP, ActionScript, JavaScript, C++, Java, and C#.
Enck and his fellow scientists built a program that took the Java bytecode that runs on Android phones and then decompiled it, converting it into something that humans could more easily look at and understand.
Java packers usually include wrapping Java bytecode with C family program which leads to the same reverse engineering process, like with C++ program implementation (non-interpreted language).
The replacement of the imports can be performed either by direct manipulation of the components' bytecode or using the AOP (Aspect Oriented Programming), which is provided by the SpringDM.
In this step the source code is passed to the java compiler to be converted into bytecode. The result of compilation at this stage produces a binary file with a .class extension.
It includes components for multimedia and signal processing, and for optimized compilation of Java and other bytecode. <p>The Android OS was developed for the ARM architecture, and Google and ARM have worked closely to optimize the OS and the Android browser.
A Java card contains the Java Card Virtual Machine, used to process bytecode, and some native methods implemented in hardware to run complex operations like cryptographic algorithms.