Sciweavers

243 search results - page 29 / 49
» Hardware Software Co-Design of a Java Virtual Machine
Sort
View
178
Voted
CCS
2011
ACM
14 years 1 months ago
Eliminating the hypervisor attack surface for a more secure cloud
Cloud computing is quickly becoming the platform of choice for many web services. Virtualization is the key underlying technology enabling cloud providers to host services for a l...
Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer R...
135
Voted
JTRES
2009
ACM
15 years 8 months ago
Avoiding unbounded priority inversion in barrier protocols using gang priority management
Large real-time software systems such as real-time Java virtual machines often use barrier protocols, which work for a dynamically varying number of threads without using centrali...
Harald Röck, Joshua S. Auerbach, Christoph M....
OOPSLA
2007
Springer
15 years 8 months ago
Ilea: inter-language analysis across java and c
Java bug finders perform static analysis to find implementation mistakes that can lead to exploits and failures; Java compilers perform static analysis for optimization. If Java...
Gang Tan, Greg Morrisett
IPPS
2002
IEEE
15 years 6 months ago
Java Mirrors: Building Blocks for Remote Interaction
Java mirror objects are building blocks for integrating web-based with high performance applications. This paper demonstrates the utility of mirror objects for construction of rem...
Yuan Chen, Karsten Schwan, David W. Rosen
144
Voted
KBSE
2005
IEEE
15 years 7 months ago
Testing in resource constrained execution environments
Software for resource constrained embedded devices is often implemented in the Java programming language because the Java compiler and virtual machine provide enhanced safety, por...
Gregory M. Kapfhammer, Mary Lou Soffa, Daniel Moss...