Sciweavers

356 search results - page 24 / 72
» Inside the Java Virtual Machine
Sort
View
ECOOP
1998
Springer
13 years 11 months ago
Orthogonal to the Java Imperative
Three nontrivial limitations of the existing JavaT M technology are considered from the viewpoint of object-oriented database technology. The limitations are: lack of support for o...
Suad Alagic, Jose Solorzano, David Gitchell
CLOUDCOM
2009
Springer
14 years 2 months ago
Cost of Virtual Machine Live Migration in Clouds: A Performance Evaluation
Abstract. Virtualization technology has become commonplace in modern data centers and cluster systems, often referred as “computing clouds”. In particular, the capability of vi...
William Voorsluys, James Broberg, Srikumar Venugop...
NDSS
2003
IEEE
14 years 23 days ago
A Virtual Machine Introspection Based Architecture for Intrusion Detection
Today’s architectures for intrusion detection force the IDS designer to make a difficult choice. If the IDS resides on the host, it has an excellent view of what is happening i...
Tal Garfinkel, Mendel Rosenblum
JIT
2004
Springer
94views Database» more  JIT 2004»
14 years 26 days ago
Self-accounting as Principle for Portable CPU Control in Java
In this paper we present a novel scheme for portable CPU accounting and control in Java, which is based on program transformation techniques and can be used with every standard Jav...
Walter Binder, Jarle Hulaas
DIMVA
2010
13 years 7 months ago
dAnubis - Dynamic Device Driver Analysis Based on Virtual Machine Introspection
Abstract. In the escalating arms race between malicious code and security tools designed to analyze it, detect it or mitigate its impact, malicious code running inside the operatin...
Matthias Neugschwandtner, Christian Platzer, Paolo...