Sciweavers

1247 search results - page 25 / 250
» A Multi-User Virtual Machine
Sort
View
OSDI
2002
ACM
14 years 9 months ago
ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay
Current system loggers have two problems: they depend on the integrity of the operating system being logged, and they do not save sufficient information to replay and analyze atta...
George W. Dunlap, Samuel T. King, Sukru Cinar, Mur...
ACSAC
2007
IEEE
14 years 3 months ago
Secure and Flexible Monitoring of Virtual Machines
The monitoring of virtual machines has many applications in areas such as security and systems management. A monitoring technique known as introspection has received significant ...
Bryan D. Payne, Wenke Lee
HPCC
2009
Springer
14 years 1 months ago
Resource Leasing and the Art of Suspending Virtual Machines
Using virtual machines as a resource provisioning mechanism offers multiple benefits, most recently exploited by “infrastructure-as-a-service” clouds, but also poses several...
Borja Sotomayor, Rubén S. Montero, Ignacio ...
SRDS
2003
IEEE
14 years 1 months ago
Transparent Fault-Tolerant Java Virtual Machine
Replication is one of the prominent approaches for obtaining fault tolerance. Implementing replication on commodity hardware and in a transparent fashion, i.e., without changing t...
Roy Friedman, Alon Kama
JAVA
2001
Springer
14 years 1 months ago
Platform independent dynamic Java virtual machine analysis: the Java Grande Forum Benchmark suite
In this paper we present a platform independent analysis of the dynamic profiles of Java programs when executing on the Java Virtual Machine. The Java programs selected are taken...
Charlie Daly, Jane Horgan, James F. Power, John Wa...