Sciweavers

838 search results - page 65 / 168
» Operating System Support for Virtual Machines
Sort
View
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
15 years 4 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
TPHOL
2007
IEEE
15 years 4 months ago
Using XCAP to Certify Realistic Systems Code: Machine Context Management
Formal, modular, and mechanized verification of realistic systems code is desirable but challenging. Verification of machine context management (a basis of multi-tasking) is one ...
Zhaozhong Ni, Dachuan Yu, Zhong Shao
VEE
2005
ACM
199views Virtualization» more  VEE 2005»
15 years 3 months ago
Escape analysis in the context of dynamic compilation and deoptimization
In object-oriented programming languages, an object is said to escape the method or thread in which it was created if it can also be accessed by other methods or threads. Knowing ...
Thomas Kotzmann, Hanspeter Mössenböck
GI
2004
Springer
15 years 3 months ago
Crash Management for Distributed Parallel Systems
: With the growing complexity of parallel architectures, the probability of system failures grows, too. One approach to cope with this problem is the self-healing, one of the organ...
Jan Haase, Frank Eschmann
HICSS
2005
IEEE
139views Biometrics» more  HICSS 2005»
15 years 3 months ago
Business Models for Mobile Communities
Communities (especially virtual communities) of Interest have been the focus of substantial discussion in academic literature. This paper addresses Communities of Interest within ...
Petra Schubert, J. Felix Hampe