Sciweavers

93 search results - page 2 / 19
» Ubiquitous Memory Introspection
Sort
View
ACSAC
2007
IEEE
13 years 11 months ago
Secure and Flexible Monitoring of Virtual Machines
The monitoring of virtual machines has many applications in areas such as security and systems management. A monitoring technique known as introspection has received significant ...
Bryan D. Payne, Wenke Lee
DSN
2005
IEEE
13 years 7 months ago
Microarchitecture-Based Introspection: A Technique for Transient-Fault Tolerance in Microprocessors
The increasing transient fault rate will necessitate onchip fault tolerance techniques in future processors. The speed gap between the processor and the memory is also increasing,...
Moinuddin K. Qureshi, Onur Mutlu, Yale N. Patt
IEEESP
2008
89views more  IEEESP 2008»
13 years 5 months ago
Virtual Machine Introspection: Observation or Interference?
hardware, eliminating an abstraction layer and often improving efficiency as a result. Examples of type 1 systems include VMware ESX,3 Xen (www. xensource.com/xen/xen/nfamily/virtu...
Kara L. Nance, Matt Bishop, Brian Hay
ASPLOS
2006
ACM
13 years 11 months ago
Introspective 3D chips
While the number of transistors on a chip increases exponentially over time, the productivity that can be realized from these systems has not kept pace. To deal with the complexit...
Shashidhar Mysore, Banit Agrawal, Navin Srivastava...
BIRTHDAY
2006
Springer
13 years 9 months ago
SharedLife: Towards Selective Sharing of Augmented Personal Memories
The rapid deployment of low-cost ubiquitous sensing devices
Wolfgang Wahlster, Alexander Kröner, Dominik ...