Sciweavers

1234 search results - page 32 / 247
» Privacy-preserving Virtual Machine
Sort
View
DAC
2005
ACM
16 years 20 days ago
Improving java virtual machine reliability for memory-constrained embedded systems
Dual-execution/checkpointing based transient error tolerance techniques have been widely used in the high-end mission critical systems. These techniques, however, are not very att...
Guangyu Chen, Mahmut T. Kandemir
ICCD
2008
IEEE
116views Hardware» more  ICCD 2008»
15 years 8 months ago
Prototyping a hybrid main memory using a virtual machine monitor
— We use a novel virtualization-based approach for computer architecture performance analysis. We present a case study analyzing a hypothetical hybrid main memory, which consists...
Dong Ye, Aravind Pavuluri, Carl A. Waldspurger, Br...
ACSAC
2007
IEEE
15 years 6 months ago
Fine-Grained Information Flow Analysis and Enforcement in a Java Virtual Machine
We have implemented an information flow framework for the Java Virtual Machine that combines static and dynamic techniques to capture not only explicit flows, but also implicit ...
Deepak Chandra, Michael Franz
DSN
2007
IEEE
15 years 6 months ago
A Fast Rejuvenation Technique for Server Consolidation with Virtual Machines
As server consolidation using virtual machines (VMs) is carried out, software aging of virtual machine monitors (VMMs) is becoming critical. Performance degradation or crash failu...
Kenichi Kourai, Shigeru Chiba
ISCA
2006
IEEE
131views Hardware» more  ISCA 2006»
15 years 5 months ago
Reducing Startup Time in Co-Designed Virtual Machines
A Co-Designed Virtual Machine allows designers to implement a processor via a combination of hardware and software. Dynamic binary translation converts code written for a conventi...
Shiliang Hu, James E. Smith