Sciweavers

OOPSLA
2005
Springer
13 years 10 months ago
Constructing a metacircular Virtual machine in an exploratory programming environment
Can virtual machine developers benefit from religiously observing the principles more often embraced for exploratory programming? To find out, we are concurrently constructing two...
David Ungar, Adam Spitz, Alex Ausch
FPL
2005
Springer
122views Hardware» more  FPL 2005»
13 years 10 months ago
FPGA-Aware Garbage Collection in Java
— During codesign of a system, one still runs into the impedance mismatch between the software and hardware worlds. er identifies the different levels of abstraction of hardware...
Philippe Faes, Mark Christiaens, Dries Buytaert, D...
VEE
2005
ACM
167views Virtualization» more  VEE 2005»
13 years 10 months ago
An execution layer for aspect-oriented programming languages
Language mechanisms deserve language implementation effort. While this maxim has led to sophisticated support for language features specific to object-oriented, functional and lo...
Michael Haupt, Mira Mezini, Christoph Bockisch, To...
VEE
2005
ACM
150views Virtualization» more  VEE 2005»
13 years 10 months ago
Diagnosing performance overheads in the xen virtual machine environment
Virtual Machine (VM) environments (e.g., VMware and Xen) are experiencing a resurgence of interest for diverse uses including server consolidation and shared hosting. An applicati...
Aravind Menon, Jose Renato Santos, Yoshio Turner, ...
SC
2005
ACM
13 years 10 months ago
VSched: Mixing Batch And Interactive Virtual Machines Using Periodic Real-time Scheduling
We are developing Virtuoso, a system for distributed computing using virtual machines (VMs). Virtuoso must be able to mix batch and interactive VMs on the same physical hardware, ...
Bin Lin, Peter A. Dinda
SISW
2005
IEEE
13 years 10 months ago
Towards Protecting Sensitive Files in a Compromised System
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Xin Zhao, Kevin Borders, Atul Prakash
ISCC
2005
IEEE
13 years 10 months ago
Virtual Machine Management for Tele-Lab "IT-Security" Server
Tele-Lab “IT-Security” Server is a new concept for practical security education. The Tele-lab server builds a virtual security laboratory using lightweight virtual machines an...
Ji Hu, Dirk Cordel, Christoph Meinel
IPPS
2005
IEEE
13 years 10 months ago
Benchmarking the CLI for I/O-Intensive Computing
Common Language Infrastructure, or CLI, is a standardized virtual machine, which increasingly becomes popular on a wide range of platforms. In this paper we developed three I/O-in...
Xiao Qin, Tao Xie 0004, Ahalya Nathan, Vijaya K. T...
ICPP
2005
IEEE
13 years 10 months ago
Service Migration in Distributed Virtual Machines for Adaptive Grid Computing
Computational grids can integrate geographically distributed resources into a seamless environment. To facilitate managing these heterogenous resources, the virtual machine gy pro...
Song Fu, Cheng-Zhong Xu
EDOC
2005
IEEE
13 years 10 months ago
Semantics of UML 2.0 Activity Diagram for Business Modeling by Means of Virtual Machine
— The paper proposes a more formalized definition of UML 2.0 Activity Diagram semantics. A subset of activity diagram constructs relevant for business process modeling is conside...
Valdis Vitolins, Audris Kalnins