Sciweavers

137 search results - page 15 / 28
» Justifying Integrity Using a Virtual Machine Verifier
Sort
View
PDP
2005
IEEE
14 years 1 months ago
Tuning Dynamic Web Applications using Fine-Grain Analysis
In this paper we present a methodology to analyze the behavior and performance of Java application servers using a performance analysis framework. This framework considers all lev...
Jordi Guitart, David Carrera, Jordi Torres, Eduard...
CODES
1999
IEEE
13 years 12 months ago
How standards will enable hardware/software co-design
o much higher levels of abstraction than today's design practices, which are usually at the level of synthesizable RTL for custom hardware or Instruction Set Simulator (ISS) f...
Mark Genoe, Christopher K. Lennard, Joachim Kunkel...
SP
2010
IEEE
174views Security Privacy» more  SP 2010»
13 years 11 months ago
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
— Virtualization is being widely adopted in today’s computing systems. Its unique security advantages in isolating and introspecting commodity OSes as virtual machines (VMs) ha...
Zhi Wang, Xuxian Jiang
ICDCS
2008
IEEE
14 years 2 months ago
Crystal: An Emulation Framework for Practical Peer-to-Peer Multimedia Streaming Systems
To rapidly evolve new designs of peer-to-peer (P2P) multimedia streaming systems, it is highly desirable to test and troubleshoot them in a controlled and repeatable experimental ...
Mea Wang, Hassan Shojania, Baochun Li
CARDIS
1998
Springer
161views Hardware» more  CARDIS 1998»
13 years 11 months ago
Formal Proof of Smart Card Applets Correctness
: The new Gemplus smart card is based on the Java technology, embedding a virtual machine. The security policy uses mechanisms that are based on Java properties. This language prov...
Jean-Louis Lanet, Antoine Requet