메뉴 건너뛰기




Volumn 33, Issue 5, 1999, Pages 202-216

Design and implementation of a distributed virtual machine for networked computers

Author keywords

[No Author keywords available]

Indexed keywords


EID: 0041350423     PISSN: 01635980     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/319344.319165     Document Type: Article
Times cited : (45)

References (64)
  • 2
    • 84937029836 scopus 로고    scopus 로고
    • Optimizing unnecessary synchronization operations from Java programs
    • Venice, Italy, September
    • J. Aldrich, C. Chambers, E. G. Sirer and S. Eggers. Optimizing Unnecessary Synchronization Operations from Java Programs. In Static Analyses Symposium, pages 19-38, Venice, Italy, September 1999.
    • (1999) Static Analyses Symposium , pp. 19-38
    • Aldrich, J.1    Chambers, C.2    Sirer, E.G.3    Eggers, S.4
  • 5
    • 0042484501 scopus 로고    scopus 로고
    • September
    • CERT Coordination Center. Weaknesses in Java Bytecode Verifier. September 1999. http://www.cert.org/advisories/ CA-96.07.java_bytecode_verifier.html.
    • (1999) Weaknesses in Java Bytecode Verifier
  • 19
    • 0003313661 scopus 로고    scopus 로고
    • Java security: Present and near future
    • May/June
    • L. Gong. Java Security: Present and Near Future. IEEE Micro, 17(3):14-19,May/June 1997.
    • (1997) IEEE Micro , vol.17 , Issue.3 , pp. 14-19
    • Gong, L.1
  • 25
    • 84983009748 scopus 로고    scopus 로고
    • Providing policy-neutral and transparent access control in extensible systems
    • J. Vitek and C. D. Jensen, editors, Secure Internet Programming -Security Issues for Mobile and Distributed Objects, Springer
    • R. Grimm and B. N. Bershad. Providing Policy-Neutral and Transparent Access Control in Extensible Systems. In J. Vitek and C. D. Jensen, editors, Secure Internet Programming -Security Issues for Mobile and Distributed Objects, volume 1603 of Lecture Notes in Computer Science, pages 317-338, Springer, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1603 , pp. 317-338
    • Grimm, R.1    Bershad, B.N.2
  • 26
  • 27
    • 85008048174 scopus 로고    scopus 로고
    • The future of systems research
    • August
    • J. Hennessy. The Future of Systems Research. In IEEE Computer, pages 27-33, August 1999.
    • (1999) IEEE Computer , pp. 27-33
    • Hennessy, J.1
  • 28
    • 85029302433 scopus 로고    scopus 로고
    • Hewlett-Packard Company. Chai Products. http://www.hp.com/emso/products/.
    • Chai Products
  • 31
    • 0041983631 scopus 로고    scopus 로고
    • July
    • Internet Software Consortium. Internet Host Domain Survey. July 1999, http://www.isc.org/.
    • (1999) Internet Host Domain Survey
  • 34
    • 0002179618 scopus 로고
    • Reprinted January
    • B. Lampson. Protection. In Proceedings of the Fifth Princeton Symposium on Information Sciences and Systems, pages 437-443, Princeton, Ney Jersey, March 1971. Reprinted in Operating Systems Review, 8(1):18-24, January 1974.
    • (1974) Operating Systems Review , vol.8 , Issue.1 , pp. 18-24
  • 41
    • 85084163247 scopus 로고
    • Providing policy control over object operations in a mach based system
    • Salt Lake City, Utah, June
    • S. E. Minear. Providing Policy Control Over Object Operations in a Mach Based System. In Proceedings of the Fifth USENIX UNIX Security Symposium. pages 141-156, Salt Lake City, Utah, June 1995.
    • (1995) Proceedings of the Fifth USENIX UNIX Security Symposium , pp. 141-156
    • Minear, S.E.1
  • 42
    • 0005008274 scopus 로고
    • Simple and flexible datagram access controls for unix-based gateways
    • Baltimore, Maryland, June
    • J. C. Mogul. Simple and Flexible Datagram Access Controls for Unix-based Gateways. In Proceedings of the Summer 1989 USENIX Conference, pages 203-221, Baltimore, Maryland, June 1989.
    • (1989) Proceedings of the Summer 1989 USENIX Conference , pp. 203-221
    • Mogul, J.C.1
  • 46
    • 0016082273 scopus 로고
    • Formal requirements for virtualizable third generation architectures
    • July
    • G. J. Popek and R. P. Goldberg. Formal Requirements for Virtualizable Third Generation Architectures. In Communications of the ACM, 17(7):412-421, July 1974.
    • (1974) Communications of the ACM , vol.17 , Issue.7 , pp. 412-421
    • Popek, G.J.1    Goldberg, R.P.2
  • 49
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and publickey cryptosystems
    • February
    • R. L. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and PublicKey Cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 51
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • September
    • J. H. Saltzer and M. D. Schroeder. The Protection of Information in Computer Systems. Proceedings of the IEEE, 63(9):1278-1308, September 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 52
    • 0042484465 scopus 로고    scopus 로고
    • Technical Report DTOS CDRL A008, Secure Computing Corporation, Roseville, Minnesota, June
    • Secure Computing Corporation. DTOS Lessons Learned Report. Technical Report DTOS CDRL A008, Secure Computing Corporation, Roseville, Minnesota, June 1997.
    • (1997) DTOS Lessons Learned Report
  • 54
    • 0042484463 scopus 로고    scopus 로고
    • Java environments
    • April 7
    • L. Seltzer. Java Environments. PC Magazine, pages 137-141, April 7, 1998.
    • (1998) PC Magazine , pp. 137-141
    • Seltzer, L.1
  • 55
    • 0003276451 scopus 로고    scopus 로고
    • A practical approach for improving startup latency in Java applications
    • INRIA Technical Report #0228, Grenoble, France, May
    • E. G. Sirer, A. J. Gregory and B. N. Bershad. A Practical Approach for Improving Startup Latency in Java Applications. In Workshop on Compiler Support for Systems Software, INRIA Technical Report #0228, pages 47-55, Grenoble, France, May 1999.
    • (1999) Workshop on Compiler Support for Systems Software , pp. 47-55
    • Sirer, E.G.1    Gregory, A.J.2    Bershad, B.N.3
  • 57
    • 85034143760 scopus 로고    scopus 로고
    • Spyglass, Inc.Software Development Interface. Naperville, IL, September
    • Spyglass, Inc.Software Development Interface. Naperville, IL, September 1999. http://www.spyglass.com/products/smosaic/sdi/sdi_spec.html
    • (1999)
  • 59
    • 34948834653 scopus 로고    scopus 로고
    • White paper, Sun Microsystems, Palo Alto, California, September
    • Sun Microsystems. The Java HotSpot Performance Engine Architecture. White paper, Sun Microsystems, Palo Alto, California, September 1999. http://java.sun.com/products/hotspot/whitepaper.html.
    • (1999) Sun Microsystems. The Java HotSpot Performance Engine Architecture
  • 60
    • 0031232912 scopus 로고    scopus 로고
    • Programming languages for mobile code
    • September
    • T. Thorn. Programming Languages for Mobile Code. ACM Computing Surveys, pages 213-239, 29(3), September 1997.
    • (1997) ACM Computing Surveys , vol.29 , Issue.3 , pp. 213-239
    • Thorn, T.1
  • 61
    • 85034127063 scopus 로고    scopus 로고
    • University of California, Irvine. p-System: Description, Background, Utilities.
    • University of California, Irvine. p-System: Description, Background, Utilities. http://www.ics.uci.edu/∼archive/documentation/p-system/p-system.html.
  • 63
    • 0032691939 scopus 로고    scopus 로고
    • Embedded Java: An uncertain future
    • May
    • W. Webb. Embedded Java: An Uncertain Future. Electrical Design News, 44(10):89-96, May 1999.
    • (1999) Electrical Design News , vol.44 , Issue.10 , pp. 89-96
    • Webb, W.1
  • 64
    • 84976653144 scopus 로고
    • Some computer science problems in ubiquitous computing
    • July
    • M. Weiser. Some Computer Science Problems in Ubiquitous Computing. In Communications of the ACM, pages 74-84, July 1993.
    • (1993) Communications of the ACM , pp. 74-84
    • Weiser, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.