Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
This paper presents a significantly improved strategy for accelerating the method calls in the REALJava coprocessor. The hardware assisted virtual machine architecture is described shortly to provide context for the method call acceleration. The strategy is implemented in an FPGA prototype. It allows measurements of real life performance increase, and validates the whole co-processor concept. The...
Java is one of the most popular programming architectures because of its platform-independence. Its platform-independence depends on Java virtual machine JVM. Compared to executing class file on hardware JVM, executing class file on software JVM is much slower. By studying we master the component architecture and the working principle of software JVM based on the class file to explain the implementation...
Virtualization has been widely used in cloud computing systems to cut costs, and to provide dynamically scalable resources over the internet. Many ideas have been proposed to increase the security of the virtualized systems. But, a big unspoken assumption of these ideas is that the cloud users have to trust the cloud provider totally and unconditionally. In reality, however, this assumption can't...
This paper surveys virtualization of I/O devices, which is one of the most difficult parts in system virtualization. Current technologies of virtualizing I/O devices include full virtualization, paravirtualization, software emulation and VMM-bypass direct I/O. Optimizations are also done to improve the performance of each technology. Most optimizations used paravirtualization technology for reference...
Virtualization technologies have been explored to mitigate the vulnerabilities in the current TCG architecture. But only a small number of efforts address the handling of the detected TCG TOCTOU attacks. This paper aims to defeat TCG TOCTOU attacks occurring in Xen hardware virtual machines. We propose an efficient response approach (ERA) in the environment of the Xen virtual machine monitor and the...
Our approach is to design and implement a continual migration strategy for virtual machines to achieve automatic failure recovery. By continually and transparently propagating virtual machine's state to a backup host via live migration techniques, trivial applications encapsulated in the virtual machine can be recovered from hardware failures with minimal downtime while no modifications are required...
We design and implement a Mandatory Access Control (MAC) system in distributed virtual computing environment, named DVM-MAC, aiming to provide distributed trust through enforcing MAC policies. In DVM-MAC, Prioritized Chinese Wall (PCW) model is implemented to control potential covert channels between VMs in both single node and distributed environment. A policy enforcement module locates inside Xen...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.