Sciweavers

1234 search results - page 79 / 247
» Privacy-preserving Virtual Machine
Sort
View
108
Voted
JVM
2001
97views Education» more  JVM 2001»
15 years 5 months ago
Deterministic Execution of Java's Primitive Bytecode Operations
For the application of Java in realtime and safety critical domains, an analysis of the worst-case execution times of primitive Java operations is necessary. All primitive operati...
Fridtjof Siebert, Andy Walter
FGCS
2006
88views more  FGCS 2006»
15 years 3 months ago
Token based networking: Experiment NL-101
This short communication outlines an experiment where tokens, associated with application oriented IP streams, authorize access to an optical lightpath during iGrid 2005. The expe...
Leon Gommans, Bas van Oudenaarde, Alfred Wan, Cees...
157
Voted
IV
2010
IEEE
186views Visualization» more  IV 2010»
15 years 1 months ago
Visual Amortization Analysis of Recompilation Strategies
Abstract--Dynamic recompilation tries to produce more efficient code by exploiting runtime information. Virtual machines like the Jikes RVM use recompilation heuristics to decide h...
Stephan Zimmer, Stephan Diehl
124
Voted
QSIC
2007
IEEE
15 years 10 months ago
Coping with API Evolution for Running, Mission-Critical Applications Using Virtual Execution Environment
Recent research showed that the majority of compatibility-breaking changes in a component-based, object-oriented software system are refactorings [5]. The software updating proces...
Bashar Gharaibeh, Tien N. Nguyen, J. Morris Chang
DASC
2006
IEEE
15 years 9 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...