Sciweavers

1247 search results - page 84 / 250
» A Multi-User Virtual Machine
Sort
View
IV
2010
IEEE
186views Visualization» more  IV 2010»
13 years 6 months ago
Visual Amortization Analysis of Recompilation Strategies
Abstract--Dynamic recompilation tries to produce more efficient code by exploiting runtime information. Virtual machines like the Jikes RVM use recompilation heuristics to decide h...
Stephan Zimmer, Stephan Diehl
QSIC
2007
IEEE
14 years 3 months ago
Coping with API Evolution for Running, Mission-Critical Applications Using Virtual Execution Environment
Recent research showed that the majority of compatibility-breaking changes in a component-based, object-oriented software system are refactorings [5]. The software updating proces...
Bashar Gharaibeh, Tien N. Nguyen, J. Morris Chang
DASC
2006
IEEE
14 years 2 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...
EUROPAR
2008
Springer
13 years 10 months ago
Complementarity between Virtualization and Single System Image Technologies
Nowadays, the use of clusters in research centers or industries is undeniable. Since few years, the usage of virtual machines (VM) offers more advanced resource management capabili...
Jérôme Gallard, Geoffroy Vallé...
ICAC
2008
IEEE
14 years 3 months ago
Power and Performance Management of Virtualized Computing Environments Via Lookahead Control
— There is growing incentive to reduce the power consumed by large-scale data centers that host online services such as banking, retail commerce, and gaming. Virtualization is a ...
Dara Kusic, Jeffrey O. Kephart, James E. Hanson, N...