Sciweavers

1247 search results - page 95 / 250
» A Multi-User Virtual Machine
Sort
View
ACSAC
2005
IEEE
15 years 10 months ago
Automated and Safe Vulnerability Assessment
As the number of system vulnerabilities multiplies in recent years, vulnerability assessment has emerged as a powerful system security administration tool that can identify vulner...
Fanglu Guo, Yang Yu, Tzi-cker Chiueh
AOSD
2007
ACM
15 years 9 months ago
A machine code model for efficient advice dispatch
The primary implementations of AspectJ to date are based on a compile- or load-time weaving process that produces Java byte code. Although this implementation strategy has been cr...
Ryan M. Golbeck, Gregor Kiczales
CVPR
1996
IEEE
16 years 7 months ago
A Stereo Machine for Video-Rate Dense Depth Mapping and Its New Applications
We have developed a video-rate stereo machine that has the capability of generating a dense depth map at the video rate. The performance bench marks of the CMU video-rate stereo m...
Takeo Kanade, Atsushi Yoshida, Kazuo Oda, Hiroshi ...
128
Voted
IPPS
1996
IEEE
15 years 9 months ago
Implementing the Data Diffusion Machine Using Crossbar Routers
The Data Diffusion Machine is a scalable virtual shared memory architecture. A hierarchical network is used to ensure that all data can be located in a time bounded by O(logp), wh...
Henk L. Muller, Paul W. A. Stallard, David H. D. W...
172
Voted
CCGRID
2010
IEEE
15 years 6 months ago
Energy Efficient Resource Management in Virtualized Cloud Data Centers
Rapid growth of the demand for computational power by scientific, business and web-applications has led to the creation of large-scale data centers consuming enormous amounts of el...
Anton Beloglazov, Rajkumar Buyya