Sciweavers

185 search results - page 19 / 37
» Analysis of virtual machine system policies
Sort
View
ICFP
2003
ACM
16 years 10 days ago
A static type system for JVM access control
This paper presents a static type system for JAVA Virtual Machine (JVM) code that enforces an access control mechanism similar to the one found, for example, in a JAVA implementat...
Tomoyuki Higuchi, Atsushi Ohori
104
Voted
JAVA
1999
Springer
15 years 4 months ago
Analysis and Development of Java Grande Benchmarks
Understanding the performance behaviour of Java Virtual Machines is important to Java systems developers and to applications developers. We review a range of Java benchmark progra...
J. A. Mathew, Paul D. Coddington, Kenneth A. Hawic...
92
Voted
ACSAC
2006
IEEE
15 years 6 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
IWQOS
2011
Springer
14 years 3 months ago
Dexferizer: A service for data transfer optimization
— We present an approach to optimizing the transfer of data objects within a user’s collection of computers and personal devices, subject to a variety of user-defined quality ...
Ercan Ucan, Timothy Roscoe
85
Voted
GECCO
2005
Springer
152views Optimization» more  GECCO 2005»
15 years 5 months ago
GAMM: genetic algorithms with meta-models for vision
Recent adaptive image interpretation systems can reach optimal performance for a given domain via machine learning, without human intervention. The policies are learned over an ex...
Greg Lee, Vadim Bulitko