We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Objects and Method Calling in Java Virtual Machine

by Sumit Gupta, Nargish Gupta, Rishabh Gupta
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 86 - Number 11
Year of Publication: 2014
Authors: Sumit Gupta, Nargish Gupta, Rishabh Gupta
10.5120/15032-3353

Sumit Gupta, Nargish Gupta, Rishabh Gupta . Objects and Method Calling in Java Virtual Machine. International Journal of Computer Applications. 86, 11 ( January 2014), 34-36. DOI=10.5120/15032-3353

@article{ 10.5120/15032-3353,
author = { Sumit Gupta, Nargish Gupta, Rishabh Gupta },
title = { Objects and Method Calling in Java Virtual Machine },
journal = { International Journal of Computer Applications },
issue_date = { January 2014 },
volume = { 86 },
number = { 11 },
month = { January },
year = { 2014 },
issn = { 0975-8887 },
pages = { 34-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume86/number11/15032-3353/ },
doi = { 10.5120/15032-3353 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:04:29.754747+05:30
%A Sumit Gupta
%A Nargish Gupta
%A Rishabh Gupta
%T Objects and Method Calling in Java Virtual Machine
%J International Journal of Computer Applications
%@ 0975-8887
%V 86
%N 11
%P 34-36
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Java virtual machine is interpreters for byte code in this paper we have discuss the internal architecture of JVM which shows that how objects go into the java heap and how method calling goes into the java stack. In this paper we also discuss the java security and process of how java programs run step by step inside JVM.

References
  1. N. Shaylor. A "Just-in-Time Compiler for Memory-Constrained Low-Power Devices", In Proceedings of the 2nd Java Virtual Machine Research and Technology Symposium, Aug. 2002.
  2. STEPHEN N. FREUND and JOHN C. MITCHELL "A Type System for the Java Byte code Language AND VERIFIER" JOURNAL OF AUTOMATED REASONING 30: 271–321, 2003.
  3. Zi-Gang Lin ; Han-Wen Kuo ; Zi-Jing Guo ; "Stack memory design for a low-cost instruction folding Java processor" Circuits and Systems (ISCAS), 2012 IEEE International Symposium.
  4. Gibbs,C. ; Coady,Y. "Aspects of Memory Management" System Sciences, 2005. HICSS '05. Proceedings of the 38th Annual Hawaii International Conference.
  5. Guangyu. Chen ; Kandemir. M,"Improving Java virtual machine reliability for memory-constrained embedded systems" Design Automation Conference, 2005.
  6. Besson, F. ; Blanc, T. ; Fournet, C. ; Gordon," From stack inspection to access control: a security analysis for libraries" A. D. Computer Security Foundations Workshop, 2004.
  7. Drossopoulou, S. : "An abstract model of Java dynamic linking, loading and verification", in R. Harper (ed. ), Workshop on Types in Compilation, Lecture Notes in Comput. Sci. 2071, 2001,pp. 53–84.
  8. Hevarbert Schildt "the complete Reference", java 2 Fifth edition.
Index Terms

Computer Science
Information Sciences

Keywords

JVM Java Java Heap Java Stack Java Virtual Machine.