Flylib.com
133.
Previous page
Table of content
Next page
Java Virtual Machine - Online Instruction Reference
example
aaload
aastore
aconst_null
aload
aload_<n>
anewarray
areturn
arraylength
astore
astore_<n>
athrow
baload
bastore
bipush
breakpoint
caload
castore
checkcast
d2f
d2i
d2l
dadd
daload
dastore
dcmpg
dcmpl
dconst_<d>
ddiv
dload
dload_<n>
dmul
dneg
drem
dreturn
dstore
dstore_<n>
dsub
dup
dup2
dup2_x1
dup2_x2
dup_x1
dup_x2
f2d
f2i
f2l
fadd
faload
fastore
fcmpg
fcmpl
fconst_<f>
fdiv
fload
fload_<n>
fmul
fneg
frem
freturn
fstore
fstore_<n>
fsub
getfield
getstatic
goto
goto_w
i2b
i2c
i2d
i2f
i2l
i2s
iadd
iaload
iand
iastore
iconst_<n>
iconst_m1
idiv
if_acmpeq
if_acmpne
if_icmpeq
if_icmpge
if_icmpgt
if_icmple
if_icmplt
if_icmpne
ifeq
ifge
ifgt
ifle
iflt
ifne
ifnonnull
ifnull
iinc
iload
iload_<n>
impdep1
impdep2
imul
ineg
instanceof
invokeinterface
invokespecial
invokestatic
invokevirtual
ior
irem
ireturn
ishl
ishr
istore
istore_<n>
isub
iushr
ixor
jsr
jsr_w
l2d
l2f
l2i
ladd
laload
land
lastore
lcmp
lconst_<l>
ldc
ldc_w
ldc2_w
ldiv
lload
lload_<n>
lmul
lneg
lookupswitch
lor
lrem
lreturn
lshl
lshr
lstore
lstore_<n>
lsub
lushr
lxor
monitorenter
monitorexit
multianewarray
new
newarray
nop
pop
pop2
putfield
putstatic
ret
return
saload
sastore
sipush
swap
tableswitch
wide
Java Virtual Machine, by Jon Meyer and Troy Downing, O'Reilly Associates
Previous page
Table of content
Next page
Java Virtual Machine (Java Series)
ISBN: 1565921941
EAN: 2147483647
Year: 1996
Pages: 171
Authors:
Troy Downing
,
Jon Meyer
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Avoiding Referential Integrity Problems When Updating the Data Source
Implementing Pessimistic Concurrency Without Using Database Locks
Binding Simple Data to Web Forms Controls
Populating a Windows Forms ComboBox
Getting SQL Server Column Metadata Without Returning Data
Beginning Cryptography with Java
Message Digests, MACs, and HMACs
Distinguished Names and Certificates
Key and Certificate Management Using Keystores
Appendix A Solutions to Exercises
Appendix B Algorithms Provided by the Bouncy Castle Provider
Lotus Notes and Domino 6 Development (2nd Edition)
Understanding Design Templates
Creating a Frameset
JavaScript Support in Domino 6
Syntax and Command Blocks
Views and Forms Working Together on the Web
Mastering Delphi 7
The Architecture of Delphi Applications
From COM to COM+
Multitier DataSnap Applications
Appendix B Extra Delphi Tools from Other Sources
Appendix C Free Companion Books on Delphi
The Oracle Hackers Handbook: Hacking and Defending Oracle
Overview of the Oracle RDBMS
The Oracle Network Architecture
Attacking the TNS Listener and Dispatchers
Attacking the Authentication Process
Accessing the File System
Python Standard Library (Nutshell Handbooks) with
The commands Module
The pdb Module
The posix Module
The dircache Module
The cmpcache Module
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies