Sciweavers

137 search results - page 5 / 28
» Justifying Integrity Using a Virtual Machine Verifier
Sort
View
ICCS
2007
Springer
13 years 11 months ago
Building Verifiable Sensing Applications Through Temporal Logic Specification
Abstract. Sensing is at the core of virtually every DDDAS application. Sensing applications typically involve distributed communication and coordination over large self-organized n...
Asad Awan, Ahmed H. Sameh, Suresh Jagannathan, Ana...
CONCURRENCY
2000
155views more  CONCURRENCY 2000»
13 years 7 months ago
Annotating Java class files with virtual registers for performance
The Java .class file is a compact encoding of programs for a stack-based virtual machine. It is intended for use in a networked environment, which requires machine independence an...
Joel Jones, Samuel N. Kamin
EUROPAR
2009
Springer
14 years 4 days ago
MyriXen: Message Passing in Xen Virtual Machines over Myrinet and Ethernet
Data access in HPC infrastructures is realized via user-level networking and OS-bypass techniques through which nodes can communicate with high bandwidth and low-latency. Virtualiz...
Anastassios Nanos, Nectarios Koziris
PPPJ
2004
ACM
14 years 28 days ago
A dynamic compiler for embedded Java virtual machines
A new acceleration technology for Java embedded virtual machines is presented in this paper. Based on the selective dynamic compilation technique, this technology addresses the J2...
Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, ...
OSDI
2002
ACM
14 years 7 months ago
ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay
Current system loggers have two problems: they depend on the integrity of the operating system being logged, and they do not save sufficient information to replay and analyze atta...
George W. Dunlap, Samuel T. King, Sukru Cinar, Mur...