Sciweavers

318 search results - page 40 / 64
» Using Memory Errors to Attack a Virtual Machine
Sort
View
SERVICEWAVE
2010
13 years 6 months ago
Simulating Autonomic SLA Enactment in Clouds Using Case Based Reasoning
Abstract. With the emergence of Cloud Computing resources of physical machines have to be allocated to virtual machines (VMs) in an ondemand way. However, the efficient allocation ...
Michael Maurer, Ivona Brandic, Rizos Sakellariou
SOUPS
2009
ACM
14 years 3 months ago
Personal choice and challenge questions: a security and usability assessment
Challenge questions are an increasingly important part of mainstream authentication solutions, yet there are few published studies concerning their usability or security. This pap...
Mike Just, David Aspinall
GECCO
1999
Springer
142views Optimization» more  GECCO 1999»
14 years 28 days ago
Towards Byte Code Genetic Programming
This paper uses the GP paradigm to evolve linear genotypes (individuals) that consist of Java byte code. Our prototype GP system is implemented in Java using a standard Java devel...
Brad Harvey, James A. Foster, Deborah A. Frincke
IEEEIAS
2009
IEEE
13 years 6 months ago
Full System Simulation and Verification Framework
In this paper, we propose a framework to develop highperformance system accelerator hardware and the corresponding software at system-level. This framework is designed by integrat...
Jing-Wun Lin, Chen-Chieh Wang, Chin-Yao Chang, Chu...
KBSE
2005
IEEE
14 years 2 months ago
Testing in resource constrained execution environments
Software for resource constrained embedded devices is often implemented in the Java programming language because the Java compiler and virtual machine provide enhanced safety, por...
Gregory M. Kapfhammer, Mary Lou Soffa, Daniel Moss...