Sciweavers

1234 search results - page 165 / 247
» Privacy-preserving Virtual Machine
Sort
View
95
Voted
ICDCSW
2005
IEEE
15 years 9 months ago
A Distributed Architecture for Management and Retrieval of Extended Points of Interest
This paper presents a distributed architecture for the management and retrieval of particular objects called POIsmarts. POIsmarts can be considered as the convergence between virt...
Claudio Bettini, Nicolò Cesa-Bianchi, Danie...
134
Voted
SCAM
2005
IEEE
15 years 9 months ago
A Fast Analysis for Thread-Local Garbage Collection with Dynamic Class Loading
Long-running, heavily multi-threaded, Java server applications make stringent demands of garbage collector (GC) performance. Synchronisation of all application threads before garb...
Richard E. Jones, Andy C. King
118
Voted
TPHOL
2005
IEEE
15 years 9 months ago
On the Correctness of Operating System Kernels
The Verisoft project aims at the pervasive formal verification of entire computer systems. In particular, the seamless verification of the academic system is attempted. This syst...
Mauro Gargano, Mark A. Hillebrand, Dirk Leinenbach...
131
Voted
UML
2005
Springer
15 years 9 months ago
Transforming Models with ATL
This paper presents ATL (ATLAS Transformation Language): a hybrid model transformation language that allows both declarative and imperative constructs to be used in transformation ...
Frédéric Jouault, Ivan Kurtev
SIGOPSE
2004
ACM
15 years 9 months ago
A sledgehammer approach to reuse of legacy device drivers
Device drivers account for the majority of an operating system’s code base, and reuse of the existing driver infrastructure is a pragmatic requirement of any new OS project. New...
Joshua LeVasseur, Volkmar Uhlig