期刊文献+

网页加载时JavaScript代码效率提高机制探讨 被引量:3

Discussion on the Improvement of Java Script Code Efficiency in Web Page Loading
下载PDF
导出
摘要 本文探讨在网页加载时,如何提高JavaScript代码执行效率,从JavaScript本身的代码机制来研究提高JavaScript代码效率和开发出高性能的web前端程序的方法。 This article explores how to improve the efficiency of JavaScript code execution when the page loads, and from JavaScript's own code mechanism to study ways to improve the efficiency of JavaScript code and develop high-performance web programs.
作者 庞双玉
出处 《数字技术与应用》 2017年第7期232-232,236,共2页 Digital Technology & Application
关键词 JAVASCRIPT 网页加载 代码效率提高 JavaScript web page loading code efficiency improvement
  • 相关文献

参考文献2

二级参考文献16

  • 1李超.CSS网站布局实录[M].北京:科学出版社,2007.
  • 2刘铭.网页设计[M].成都:电子科技大学出版杜,2009.12.
  • 3Jeremy Keith著.杨涛译Javascdpt DOM脚本编程艺术[M].北京:人民邮电出版社,2007.1.
  • 4FELMETSGER V, CAVEDON L, KRUEGEL C, et al. Toward au- tomated detection of logic vutnerabilities in Web applications [ C]// Proceedings of the 19th USENIX Security Symposium. Berkeley: USENIX Association, 2010:143 - 160.
  • 5XU W, ZHANG F, ZHU S. JStill: mostly static detection of obfus- cated malicious JavaScript code [ C]//Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy. New York: ACM, 2013: 117-128.
  • 6XU W, ZHANG F, ZHU S. The power of obfuscation techniques in malicious JavaScript code: a measurement study [ C] // Proceedings of the 7th International Conference on Malicious and Unwanted Soft- ware. Piscataway: IEEE, 2012:9 - 16.
  • 7COHEN F B. Operating system protection through program evolution [J]. Computers & Security, 1993, 12(6): 565-584.
  • 8CHEN P-Y, KATARIA G, KRISHNAN R. Software diversity for in- formation security [ EB/OL]. [ 2014- 06- 06]. http://infosecon. net/workshop/pdf/47, pdf.
  • 9COLLBERG C, NAGRA J. Surreptitious software: obfuscation, wa- termarking, and tamperproofing for software protection [ M]. Bos-ton: Addison-Wesley, 2009:203-209.
  • 10COLLBERG C, MARTIN S, MYERS J, et al. Distributed applica- tion tamper detection via continuous software updates [ C]// Pro- ceedings of the 28th Annum Computer Security Applications Confer- ence. New York: ACM, 2012:319-328.

共引文献3

同被引文献36

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部