Sciweavers

185 search results - page 8 / 37
» Analysis of virtual machine system policies
Sort
View
82
Voted
ASM
2010
ASM
15 years 6 months ago
Lightweight Modeling of Java Virtual Machine Security Constraints
The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly i...
Mark C. Reynolds
68
Voted
ICALT
2003
IEEE
15 years 2 months ago
Learning Resources Brokerage Systems: An Agent-Based Virtual Market Model
This paper discusses issues related with learning resources brokerage systems. It introduces a market-based modeling approach and proposes a virtual market model design of a broke...
Nikos Manouselis, Demetrios G. Sampson
VEE
2006
ACM
150views Virtualization» more  VEE 2006»
15 years 3 months ago
Evaluating fragment construction policies for SDT systems
Software Dynamic Translation (SDT) systems have been used for program instrumentation, dynamic optimization, security policy enforcement, intrusion detection, and many other uses....
Jason Hiser, Daniel Williams, Adrian Filipi, Jack ...
JCO
2010
70views more  JCO 2010»
14 years 8 months ago
Worst-case analysis for on-line service policies
This paper considers an on-line scheduling problem occurred in a service system with two classes (normal and special) of customers and two types (dedicated and flexible) of serve...
Zhenbo Wang, Wenxun Xing
ICCD
2008
IEEE
116views Hardware» more  ICCD 2008»
15 years 6 months ago
Prototyping a hybrid main memory using a virtual machine monitor
— We use a novel virtualization-based approach for computer architecture performance analysis. We present a case study analyzing a hypothetical hybrid main memory, which consists...
Dong Ye, Aravind Pavuluri, Carl A. Waldspurger, Br...