142
click to vote
VEE
15 years 8 months ago
2006 ACM
During recent years, microprocessor energy consumption has been surging and efforts to reduce power and energy have received a lot of attention. At the same time, virtual executio...
140
click to vote
VEE
15 years 8 months ago
2006 ACM
Many fault-tolerant and intrusion-tolerant systems require the ability to execute unsafe programs in a realistic environment without leaving permanent damages. Virtual machine tec...
156
click to vote
VEE
15 years 8 months ago
2006 ACM
Software Dynamic Translation (SDT) systems have been used for program instrumentation, dynamic optimization, security policy enforcement, intrusion detection, and many other uses....
145
click to vote
VEE
15 years 8 months ago
2006 ACM
One of the most common forms of security attacks involves exploiting a vulnerability to inject malicious code into an executing application and then cause the injected code to be ...
140
click to vote
VEE
15 years 8 months ago
2006 ACM
We present Vector LLVA, a virtual instruction set architecture (VISA) that exposes extensive static information about vector parallelism while avoiding the use of hardware-speciï¬...
|