Sciweavers

1234 search results - page 22 / 247
» Privacy-preserving Virtual Machine
Sort
View
ACSAC
2007
IEEE
15 years 6 months ago
Secure and Flexible Monitoring of Virtual Machines
The monitoring of virtual machines has many applications in areas such as security and systems management. A monitoring technique known as introspection has received significant ...
Bryan D. Payne, Wenke Lee
HPCC
2009
Springer
15 years 4 months ago
Resource Leasing and the Art of Suspending Virtual Machines
Using virtual machines as a resource provisioning mechanism offers multiple benefits, most recently exploited by “infrastructure-as-a-service” clouds, but also poses several...
Borja Sotomayor, Rubén S. Montero, Ignacio ...
SRDS
2003
IEEE
15 years 5 months ago
Transparent Fault-Tolerant Java Virtual Machine
Replication is one of the prominent approaches for obtaining fault tolerance. Implementing replication on commodity hardware and in a transparent fashion, i.e., without changing t...
Roy Friedman, Alon Kama
JAVA
2001
Springer
15 years 4 months ago
Platform independent dynamic Java virtual machine analysis: the Java Grande Forum Benchmark suite
In this paper we present a platform independent analysis of the dynamic profiles of Java programs when executing on the Java Virtual Machine. The Java programs selected are taken...
Charlie Daly, Jane Horgan, James F. Power, John Wa...
ISCOPE
1998
Springer
15 years 3 months ago
Dynamic Reconfiguration and Virtual Machine Management in the Harness Metacomputing System
Metacomputing frameworks have received renewed attention of late, fueled both by advances in hardware and networking, and by novel concepts such as computational grids. However the...
Mauro Migliardi, Jack Dongarra, Al Geist, Vaidy S....