Sciweavers

1234 search results - page 102 / 247
» Privacy-preserving Virtual Machine
Sort
View
ECOOP
2011
Springer
14 years 3 months ago
Frequency Estimation of Virtual Call Targets for Object-Oriented Programs
Abstract. The information of execution frequencies of virtual call targets is valuable for program analyses and optimizations of object-oriented programs. However, to obtain this i...
Cheng Zhang, Hao Xu, Sai Zhang, Jianjun Zhao, Yuti...
BMCBI
2008
118views more  BMCBI 2008»
15 years 4 months ago
Virtual screening of GPCRs: An in silico chemogenomics approach
The G-protein coupled receptor (GPCR) superfamily is currently the largest class of therapeutic targets. In silico prediction of interactions between GPCRs and small molecules is ...
Laurent Jacob, Brice Hoffmann, Véronique St...
ICS
1999
Tsinghua U.
15 years 8 months ago
Fast cluster failover using virtual memory-mapped communication
This paper proposes a novel way to use virtual memorymapped communication (VMMC) to reduce the failover time on clusters. With the VMMC model, applications’ virtual address spac...
Yuanyuan Zhou, Peter M. Chen, Kai Li
139
Voted
VEE
2009
ACM
613views Virtualization» more  VEE 2009»
15 years 10 months ago
BitVisor: a thin hypervisor for enforcing i/o device security
Virtual machine monitors (VMMs), including hypervisors, are a popular platform for implementing various security functionalities. However, traditional VMMs require numerous compon...
Takahiro Shinagawa, Hideki Eiraku, Kouichi Tanimot...
COOPIS
2004
IEEE
15 years 7 months ago
Enabling Rapid Feature Deployment on Embedded Platforms with JeCOM Bridge
A new class of embedded devices is emerging that has a mixture of traditional firmware (written in C/C++) with an embedded virtual machine (e.g., Java). For these devices, the main...
Jun Li, Keith Moore