Sciweavers

1410 search results - page 17 / 282
» A Logic for Virtual Memory
Sort
View
80
Voted
INFOCOM
2010
IEEE
14 years 8 months ago
Malicious Shellcode Detection with Virtual Memory Snapshots
Abstract—Malicious shellcodes are segments of binary code disguised as normal input data. Such shellcodes can be injected into a target process’s virtual memory. They overwrite...
Boxuan Gu, Xiaole Bai, Zhimin Yang, Adam C. Champi...
EUROPDS
1997
14 years 10 months ago
A Combined Virtual Shared Memory and Network which Schedules
In this paper, we follow a new path to arrive at the idea of a COMA — a Cache Only Memory Architecture. We show how the evolution of another architecture (ADARC) leads quite nat...
Ronald Moore, Bernd Klauer, Klaus Waldschmidt
CBSE
2006
Springer
15 years 1 months ago
Impact of Virtual Memory Managers on Performance of J2EE Applications
We investigate the impact of Operating System's Virtual Memory Managers (VMMs) on performance of enterprise applications. By taking various popular branches of the Linux kerne...
Alexander Ufimtsev, Alena Kucharenka, Liam Murphy
ISCA
2012
IEEE
333views Hardware» more  ISCA 2012»
12 years 12 months ago
Reducing memory reference energy with opportunistic virtual caching
Most modern cores perform a highly-associative translation look aside buffer (TLB) lookup on every memory access. These designs often hide the TLB lookup latency by overlapping it...
Arkaprava Basu, Mark D. Hill, Michael M. Swift
OSDI
2008
ACM
15 years 9 months ago
Difference Engine: Harnessing Memory Redundancy in Virtual Machines
Virtual machine monitors (VMMs) are a popular platform for Internet hosting centers and cloud-based compute services. By multiplexing hardware resources among virtual machines (VM...
Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan...