Analysis and Design of the JCVM Runtime Environment

Article Preview

Abstract:

According to the complexity of the JCVM system, in accordance with the combination of inside and outside thinking, designed storage structure of the external file and the data structure of the internal environment. Using the instance tested practical operating effect of the system and the result shows that the system performance to some extent improvement compared with GP common platform and analyzed the experimental results, and further for the optimization methods present a simple discussion.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 756-759)

Pages:

2593-2596

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Qin Baoan. Dynamic multi-application card research and implementation of the operation system [D]. WuHan: Middle china university of technology and science. (2005).

Google Scholar

[2] Sun Microsystems, Inc. Runtime Environment Specification Java Card™ Platform, Version 2. 2. 1[S]. October, (2003).

Google Scholar

[3] Yoon-Sim Yang, Won-Ho Choi. An advanced Java Card System Architecture for Smart Card Based on Large RAM Memory[C]. International conference on hybrid information technology. (2006).

DOI: 10.1109/ichit.2006.253676

Google Scholar

[4] Min-Sik Jin, Min-Soo Jung. A study on fast JCVM by moving object from EEPROM to RAM[C]. Proceeding of the 11th IEEE international conference on Embedded and real-Time Computing Systems and Applications. (2005).

DOI: 10.1109/rtcsa.2005.16

Google Scholar

[5] Se-Won Oh, Seung-Joon Seok. An improvement for Applets download speed using transaction buffers based on RAM memory of Java Card system using IC chip[J]. IEICE Electronics Express. Vol 8, NO. 10, 705-709. (2011).

DOI: 10.1587/elex.8.705

Google Scholar

[6] Michal Spivak, Sivan Toledo. Storing a persistent transactional heap on flash memory[J]. Sigplan Notices-SIGPLAN, Vol. 41, NO. 7, 22-33. (2006).

DOI: 10.1145/1159974.1134655

Google Scholar

[7] Wu Jianjun, Guo Jianpin. A cache based method for the JCVM optimization [J]. computer engineering and science. 2010. vol. 32, No. 3: 141-143.

Google Scholar

[8] Han Jing. Research and practice of Java byte code optimize method [D]. WuHan: Middle china university of technology and science. (2008).

Google Scholar

[9] Ahmadou Al Khary Séré, Julien Iguchi- Cartigny. Checking the Paths to identify mutant application on embedded systems [C]. T. -h. Kim et al. (Eds. ): FGIT 2010, LNCS Vol. 6485 Springer: 459-468.

DOI: 10.1007/978-3-642-17569-5_45

Google Scholar

[10] Eric Vetillard, Anthony Ferrari. Combined attacks and countermeasures [C]. IFIP 2010. D. Gollmann, J. -L. Lguchi-Cartigny (Eds. ): CARDIS 2010, LNCS 6035: 133-147.

Google Scholar