Sciweavers

1234 search results - page 194 / 247
» Privacy-preserving Virtual Machine
Sort
View
130
Voted
SP
2008
IEEE
119views Security Privacy» more  SP 2008»
15 years 10 months ago
Verifying the Safety of User Pointer Dereferences
Operating systems divide virtual memory addresses into kernel space and user space. The interface of a modern operating system consists of a set of system call procedures that may...
Suhabe Bugrara, Alex Aiken
132
Voted
HICSS
2007
IEEE
120views Biometrics» more  HICSS 2007»
15 years 10 months ago
A Model-Based Approach for Platform-Independent Binary Components with Precise Timing and Fine-Grained Concurrency
Fine grained concurrency and accurate timing can be essential for embedded hardware and software systems. These requirements should be reflected in the specification and must be c...
Tim Schattkowsky, Gregor Engels, Alexander Fö...
136
Voted
ICAC
2007
IEEE
15 years 10 months ago
Autonomous Return on Investment Analysis of Additional Processing Resources
As the use of virtualization and partitioning grows, it becomes possible to deploy a multi-tier web-based application with a variable amount of computing power. This introduces th...
Jonathan Wildstrom, Peter Stone, Emmett Witchel
100
Voted
CC
2007
Springer
143views System Software» more  CC 2007»
15 years 9 months ago
Accurate Garbage Collection in Uncooperative Environments with Lazy Pointer Stacks
Implementing a new programming language by the means of a translator to an existing language is attractive as it provides portability over all platforms supported by the host langu...
Jason Baker, Antonio Cunei, Filip Pizlo, Jan Vitek
116
Voted
CLEF
2007
Springer
15 years 9 months ago
Bengali and Hindi to English CLIR Evaluation
This paper presents a cross-language retrieval system for the retrieval of English documents in response to queries in Bengali and Hindi, as part of our participation in CLEF1 2007...
Debasis Mandal, Mayank Gupta, Sandipan Dandapat, P...