Sciweavers

17 search results - page 2 / 4
» Multitasking without Compromise: A Virtual Machine Evolution
Sort
View
CEC
2005
IEEE
13 years 10 months ago
Evolution of L-systems for compact virtual landscape generation
An L-system or Lindenmayer system consists of a grammar and an interpreter. The grammar contains an axiom, usually a short string, that the grammar expands into a long, complex st...
Daniel A. Ashlock, Stephen P. Gent, Kenneth Mark B...
VEE
2012
ACM
215views Virtualization» more  VEE 2012»
12 years 8 days ago
SecondSite: disaster tolerance as a service
This paper describes the design and implementation of SecondSite, a cloud-based service for disaster tolerance. SecondSite extends the Remus virtualization-based high availability...
Shriram Rajagopalan, Brendan Cully, Ryan O'Connor,...
VEE
2012
ACM
239views Virtualization» more  VEE 2012»
12 years 8 days ago
Facilitating inter-application interactions for OS-level virtualization
OS-level virtualization generates a minimal start-up and run-time overhead on the host OS and thus suits applications that require both good isolation and high efficiency. However...
Zhiyong Shan, Xin Wang 0001, Tzi-cker Chiueh, Xiao...
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
13 years 11 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
GECCO
2009
Springer
166views Optimization» more  GECCO 2009»
13 years 11 months ago
Genetic programming in the wild: evolving unrestricted bytecode
We describe a methodology for evolving Java bytecode, enabling the evolution of extant, unrestricted Java programs, or programs in other languages that compile to Java bytecode. B...
Michael Orlov, Moshe Sipper