Sciweavers

288 search results - page 8 / 58
» Virtual Machines, Managed Code and Component Technology
Sort
View
92
Voted
ASM
2010
ASM
15 years 8 months ago
Lightweight Modeling of Java Virtual Machine Security Constraints
The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly i...
Mark C. Reynolds
MOBICOM
2004
ACM
15 years 5 months ago
Using code collection to support large applications on mobile devices
The progress of mobile device technology unfolds a new spectrum of applications that challenges conventional infrastructure models. Most of these devices are perceived by their us...
Lucian Popa 0002, Irina Athanasiu, Costin Raiciu, ...
ELPUB
2006
ACM
15 years 5 months ago
A Subject-Machine-Object Interaction Reference Model and its Application in Electronic Publishing
The necessity of a subject–machine–object interaction (SMOI) reference model and its application in electronic publishing of the objects of our culture is considered. The comp...
Stoyan A. Poryazov
96
Voted
ISSTA
2010
ACM
15 years 3 months ago
Testing system virtual machines
Virtual machines offer the ability to partition the resources of a physical system and to create isolated execution environments. The development of virtual machines is a very ch...
Lorenzo Martignoni, Roberto Paleari, Giampaolo Fre...
COOPIS
2004
IEEE
15 years 3 months ago
Enabling Rapid Feature Deployment on Embedded Platforms with JeCOM Bridge
A new class of embedded devices is emerging that has a mixture of traditional firmware (written in C/C++) with an embedded virtual machine (e.g., Java). For these devices, the main...
Jun Li, Keith Moore