Sciweavers

1234 search results - page 103 / 247
» Privacy-preserving Virtual Machine
Sort
View
OSDI
2000
ACM
15 years 5 months ago
Processes in KaffeOS: Isolation, Resource Management, and Sharing in Java
Single-language runtime systems, in the form of Java virtual machines, are widely deployed platforms for executing untrusted mobile code. These runtimes provide some of the featur...
Godmar Back, Wilson C. Hsieh, Jay Lepreau
DSS
2000
82views more  DSS 2000»
15 years 3 months ago
A sales agent for part manufacturers: VMSA
The sales activity of most parts manufacturing companies is based on orders of buyers. The process of promotion, receipt and selection of orders of the parts manufacturers is clos...
Hyung Rim Choi, Hyun Soo Kim, Young Jae Park, Kyou...
MST
2000
101views more  MST 2000»
15 years 3 months ago
Robust Parallel Computations through Randomization
In this paper we present an efficient general simulation strategy for computations designed for fully operational BSP machines of n ideal processors, on n-processor dynamic-fault-p...
Spyros C. Kontogiannis, Grammati E. Pantziou, Paul...
SRDS
2007
IEEE
15 years 10 months ago
Customizable Fault Tolerance for Wide-Area Replication
Constructing logical machines out of collections of physical machines is a well-known technique for improving the robustness and fault tolerance of distributed systems. We present...
Yair Amir, Brian A. Coan, Jonathan Kirsch, John La...
ICCCN
2007
IEEE
15 years 10 months ago
Evaluating Xen for Router Virtualization
— In this paper, we evaluate the performance of a software IP router forwarding plane inside the Xen virtual machine monitor environment with a view to identifying (some) design ...
Norbert Egi, Adam Greenhalgh, Mark Handley, Micka&...