Sciweavers

356 search results - page 5 / 72
» Inside the Java Virtual Machine
Sort
View
ASM
2010
ASM
14 years 4 months ago
Lightweight Modeling of Java Virtual Machine Security Constraints
The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly i...
Mark C. Reynolds
JVM
2001
97views Education» more  JVM 2001»
13 years 8 months ago
Deterministic Execution of Java's Primitive Bytecode Operations
For the application of Java in realtime and safety critical domains, an analysis of the worst-case execution times of primitive Java operations is necessary. All primitive operati...
Fridtjof Siebert, Andy Walter
CONCURRENCY
1998
181views more  CONCURRENCY 1998»
13 years 7 months ago
Communication Performance of Java-Based Parallel Virtual Machines
Message passing libraries such as Parallel Virtual Machine PVM and Message Passing Interface MPI provide a common Application Programming Interface API to implement parallel...
Narendar Yalamanchilli, William W. Cohen
CODES
2005
IEEE
14 years 1 months ago
Enabling unrestricted automated synthesis of portable hardware accelerators for virtual machines
The performance of virtual machines (e.g., Java Virtual Machines—JVMs) can be significantly improved when critical code sections (e.g., Java bytecode methods) are migrated from...
Miljan Vuletic, Christophe Dubach, Laura Pozzi, Pa...
POS
1998
Springer
13 years 11 months ago
Straightforward Java Persistence Through Checkpointing
Several techniques have been proposed for adding persistence to the Java language environment. This paper describes a system we call icee that works by checkpointing the Java Virt...
Jon Howell