Sciweavers

12519 search results - page 2494 / 2504
» Approximation Problems Categories
Sort
View
161
Voted
POPL
2012
ACM
13 years 7 months ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama
VEE
2012
ACM
187views Virtualization» more  VEE 2012»
13 years 7 months ago
DDGacc: boosting dynamic DDG-based binary optimizations through specialized hardware support
Dynamic Binary Translators (DBT) and Dynamic Binary Optimization (DBO) by software are used widely for several reasons including performance, design simplification and virtualiza...
Demos Pavlou, Enric Gibert, Fernando Latorre, Anto...
VEE
2012
ACM
214views Virtualization» more  VEE 2012»
13 years 7 months ago
CompSC: live migration with pass-through devices
Live migration is one of the most important features of virtualization technology. With regard to recent virtualization techniques, performance of network I/O is critical. Current...
Zhenhao Pan, Yaozu Dong, Yu Chen, Lei Zhang, Zhiji...
VEE
2012
ACM
239views Virtualization» more  VEE 2012»
13 years 7 months ago
Transparent dynamic instrumentation
Process virtualization provides a virtual execution environment within which an unmodified application can be monitored and controlled while it executes. The provided layer of co...
Derek Bruening, Qin Zhao, Saman P. Amarasinghe
VEE
2012
ACM
222views Virtualization» more  VEE 2012»
13 years 7 months ago
Unpicking the knot: teasing apart VM/application interdependencies
Flexible and efficient runtime design requires an understanding of the dependencies among the components internal to the runtime and those between the application and the runtime...
Yi Lin, Stephen M. Blackburn, Daniel Frampton
« Prev « First page 2494 / 2504 Last » Next »