Sciweavers

185 search results - page 36 / 37
» Analysis of virtual machine system policies
Sort
View
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
13 years 11 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee
PLDI
1998
ACM
13 years 9 months ago
The Implementation of the Cilk-5 Multithreaded Language
The fth release of the multithreaded language Cilk uses a provably good \work-stealing" scheduling algorithm similar to the rst system, but the language has been completely r...
Matteo Frigo, Charles E. Leiserson, Keith H. Randa...
BMCBI
2007
140views more  BMCBI 2007»
13 years 5 months ago
Accurate prediction of protein secondary structure and solvent accessibility by consensus combiners of sequence and structure in
Background: Structural properties of proteins such as secondary structure and solvent accessibility contribute to three-dimensional structure prediction, not only in the ab initio...
Gianluca Pollastri, Alberto J. M. Martin, Catherin...
IISWC
2008
IEEE
13 years 11 months ago
On the representativeness of embedded Java benchmarks
— Java has become one of the predominant languages for embedded and mobile platforms due to its architecturally neutral design, portability, and security. But Java execution in t...
Ciji Isen, Lizy Kurian John, Jung Pil Choi, Hyo Ju...
CASES
2007
ACM
13 years 9 months ago
Scratch-pad memory allocation without compiler support for java applications
ABSTRACT This paper presents the first scratch-pad memory allocation scheme that requires no compiler support for interpreted-language based applications. A scratch-pad memory (SPM...
Nghi Nguyen, Angel Dominguez, Rajeev Barua