Sciweavers

1234 search results - page 173 / 247
» Privacy-preserving Virtual Machine
Sort
View
JVM
2004
102views Education» more  JVM 2004»
15 years 5 months ago
One-Click Distribution of Preconfigured Linux Runtime State
Checkpointing virtual machines shows potential for allowing a user to download, install, and initialize a complete software environment by selecting a web page link. Starting with...
Richard Potter
IRMA
2000
15 years 5 months ago
Video performance in Java
The tremendous growth in both Java and multimedia present an opportunity for cross-platform multimedia applications. However, little research has been done on Java multimedia perf...
Mark Claypool, Tom Coates, Shawn Hooley, Eric Shea...
138
Voted
ADHOC
2008
122views more  ADHOC 2008»
15 years 3 months ago
Balancing computation and communication costs: The case for hybrid execution in sensor networks
Virtual machines (VM) are promising as system software in sensor networks. A major impediment to their widespread acceptance is their performance overhead. Compiling VM bytecode to...
Joel Koshy, Ingwar Wirjawan, Raju Pandey, Yann Ram...
COMPSEC
2006
141views more  COMPSEC 2006»
15 years 3 months ago
Comparing Java and .NET security: Lessons learned and missed
Many systems execute untrusted programs in virtual machines (VMs) to limit their access to system resources. Sun introduced the Java VM in 1995, primarily intended as a lightweigh...
Nathanael Paul, David Evans
104
Voted
ENTCS
2006
127views more  ENTCS 2006»
15 years 3 months ago
Tool support for MOLA
The paper describes the MOLA Tool, which supports the model transformation language MOLA. MOLA Tool consists of two parts: MOLA definition environment and MOLA execution environme...
Audris Kalnins, Edgars Celms, Agris Sostaks