-
3
-
-
84994348621
-
Processes in KaffeOS: Isolation, resource management, and sharing in Java
-
(San Diego, Oct.)
-
Back, G., Hsieh, W. C., and Lepreau, J. 2000. Processes in KaffeOS: Isolation, resource management, and sharing in Java. In Proceedings of the Fourth Symposium on Operating Systems Design and Implementation (OSDI2000) (San Diego, Oct.).
-
(2000)
Proceedings of the Fourth Symposium on Operating Systems Design and Implementation (OSDI2000)
-
-
Back, G.1
Hsieh, W.C.2
Lepreau, J.3
-
4
-
-
85084164536
-
Techniques for the design of Java operating system
-
(San Diego, June)
-
Back, G., Tullmann, P., Stoller, L., Hsieh, W. C., and Lepreau, J. 2000. Techniques for the design of Java operating system. In Proceedings of the 2000 Usenix Annual Technical Conference (San Diego, June).
-
(2000)
Proceedings of the 2000 Usenix Annual Technical Conference
-
-
Back, G.1
Tullmann, P.2
Stoller, L.3
Hsieh, W.C.4
Lepreau, J.5
-
5
-
-
0039015799
-
Towards A resource-safe Java for service guarantees in uncooperative environments
-
(Madrid, Dec.)
-
Bernadat, P., Lambright, D., and Travostino, F. 1998. Towards A resource-safe Java for service guarantees in uncooperative environments. In Proceedings of the IEEE Workshop on Programming Languages for Real-Time Industrial Applications (Madrid, Dec.).
-
(1998)
Proceedings of the IEEE Workshop on Programming Languages for Real-Time Industrial Applications
-
-
Bernadat, P.1
Lambright, D.2
Travostino, F.3
-
9
-
-
84964556643
-
Mobile code security by Java bytecode instrumentation
-
(Anaheim, Calif., June)
-
Chander, A., Mitchell, J. C., and Shin, I. 2001. Mobile code security by Java bytecode instrumentation. In Proceedings of the 2001 DARPA Information Survivability Conference & Exposition (DISCEXII) (Anaheim, Calif., June).
-
(2001)
Proceedings of the 2001 DARPA Information Survivability Conference & Exposition (DISCEXII
-
-
Chander, A.1
Mitchell, J.C.2
Shin, I.3
-
11
-
-
0005372913
-
Automatic program transformation with JOIE
-
(New Orleans, June)
-
Cohen, G., Chase, J., and Kaminsky, D. 1998. Automatic program transformation with JOIE. In Proceedings of the 1998 Usenix Annual Technical Symposium (New Orleans, June), 167-178.
-
(1998)
Proceedings of the 1998 Usenix Annual Technical Symposium
, pp. 167-178
-
-
Cohen, G.1
Chase, J.2
Kaminsky, D.3
-
12
-
-
0035551797
-
Multi-tasking without compromise: A virtual machine approach
-
(Tampa Bay, Fl., Oct.)
-
Czajkowski, G. and Daynes, L. 2001. Multi-tasking without compromise: A virtual machine approach. In Proceedings of Object-Oriented Programming, Systems, Languages and Applications (Tampa Bay, Fl., Oct.).
-
(2001)
Proceedings of Object-Oriented Programming, Systems, Languages and Applications
-
-
Czajkowski, G.1
Daynes, L.2
-
13
-
-
0012073784
-
JRes: A resource accounting interface for Java
-
(Vancouver, British Columbia, Oct.)
-
Czajkowski, G. and Von Eicken, T. 1998. JRes: A resource accounting interface for Java. In Proceedings of the ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (Vancouver, British Columbia, Oct.), 21-35.
-
(1998)
Proceedings of the ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications
, pp. 21-35
-
-
Czajkowski, G.1
Von Eicken, T.2
-
14
-
-
0035016442
-
High-performance, space-efficient, automated object locking
-
(Heidelberg, April)
-
Daynes, L. and Czajkowski, G. 2001. High-performance, space-efficient, automated object locking. In Proceedings of the Seventeenth International Conference on Data Engineering (Heidelberg, April).
-
(2001)
Proceedings of the Seventeenth International Conference on Data Engineering
-
-
Daynes, L.1
Czajkowski, G.2
-
16
-
-
0037974167
-
Java security: Web browsers and beyond
-
D. E. Denning and P. J. Denning, Eds., ACM, New York
-
Dean, D., Felten, E. W., Wallach, D. S., and BALFANZ, D. 1997. Java security: Web browsers and beyond. In Internet Besieged: Countering Cyberspace Scofflaws, D. E. Denning and P. J. Denning, Eds., ACM, New York, 241-269.
-
(1997)
Internet Besieged: Countering Cyberspace Scofflaws
, pp. 241-269
-
-
Dean, D.1
Felten, E.W.2
Wallach, D.S.3
BALFANZ, D.4
-
18
-
-
0040199686
-
What Is Java binary compatibility?
-
(Vancouver, British Columbia, Oct.)
-
Drossopoulou, S., Wragg, D., and Eisenbach, S. 1998. What Is Java binary compatibility? In Proceedings of the ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (Vancouver, British Columbia, Oct.), 341-358.
-
(1998)
Proceedings of the ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications
, pp. 341-358
-
-
Drossopoulou, S.1
Wragg, D.2
Eisenbach, S.3
-
19
-
-
0032218233
-
History-based access control for mobile code
-
(San Francisco, Nov.), ACM, New York
-
Edjlali, G., Acharya, A., and Chaudhary, V. 1998. History-based access control for mobile code. In Proceedings of the Fifth ACM Conference on Computer and Communications Security (CCS '98) (San Francisco, Nov.), ACM, New York, 38-48.
-
(1998)
Proceedings of the Fifth ACM Conference on Computer and Communications Security (CCS '98)
, pp. 38-48
-
-
Edjlali, G.1
Acharya, A.2
Chaudhary, V.3
-
20
-
-
0033489650
-
Sasi enforcement of security policies: A retrospective
-
(Caledon Hills, Ontario, Sept.), ACM, New York
-
Erlingsson, U. and Schneider, F. B. 1999. Sasi enforcement of security policies: A retrospective. In Proceedings of the 1999 New Security Paradigms Workshop (Caledon Hills, Ontario, Sept.), ACM, New York.
-
(1999)
Proceedings of the 1999 New Security Paradigms Workshop
-
-
Erlingsson, U.1
Schneider, F.B.2
-
22
-
-
0026913084
-
The revised report on the syntactic theories of sequential control and state
-
Felleisen, M. and Hieb, R. 1992. The revised report on the syntactic theories of sequential control and state. Theor. Comput. Sci. 102, 235-271.
-
(1992)
Theor. Comput. Sci.
, vol.102
, pp. 235-271
-
-
Felleisen, M.1
Hieb, R.2
-
23
-
-
17144390777
-
Programming languages as operating systems
-
(or revenge of the son of the Lisp machine) (Paris, Sept.)
-
Flatt, M., Findler, R. B., Krishnamurthy, S., and Felleisen, M. 1999. Programming languages as operating systems (or revenge of the son of the Lisp machine). In Proceedings of the 1999 ACM International Conference on Functional Programming (ICFP '99) (Paris, Sept.).
-
(1999)
Proceedings of the 1999 ACM International Conference on Functional Programming (ICFP '99)
-
-
Flatt, M.1
Findler, R.B.2
Krishnamurthy, S.3
Felleisen, M.4
-
25
-
-
0003801299
-
-
Addison-Wesley, Reading, Mass
-
Gong, L. 1999. Inside Java 2 Platform Security: Architecture, API Design, and Implementation. Addison-Wesley, Reading, Mass.
-
(1999)
Inside Java 2 Platform Security: Architecture, API Design, and Implementation.
-
-
Gong, L.1
-
26
-
-
0003518498
-
-
Addison-Wesley, Reading, Mass
-
Gosling, J., JOY, B., and STEELE, G. 1996. The Java Language Specification. Addison-Wesley, Reading, Mass.
-
(1996)
The Java Language Specification.
-
-
Gosling, J.1
JOY, B.2
STEELE, G.3
-
27
-
-
85084164107
-
Implementing multiple protection domains in Java
-
(New Orleans, June). USENIX
-
Hawblitzel, C., Chang, C.-C., Czajkowski, G., Hu, D., and Von Eicken, T. 1998. Implementing multiple protection domains in Java. In USENIX Annual Technical Conference (New Orleans, June). USENIX.
-
(1998)
USENIX Annual Technical Conference
-
-
Hawblitzel, C.1
Chang, C.-C.2
Czajkowski, G.3
Hu, D.4
Von Eicken, T.5
-
28
-
-
17244380228
-
PLAN: A packet language for active networks
-
ACM, New York
-
Hicks, M., Kakkar, P., Moore, J. T., Gunter, C. A., and Nettles, S. 1998. PLAN: A packet language for active networks. In Proceedings of the Third ACM SIGPLAN International Conference on Functional Programming Languages, ACM, New York, 86-93.
-
(1998)
Proceedings of the Third ACM SIGPLAN International Conference on Functional Programming Languages
, pp. 86-93
-
-
Hicks, M.1
Kakkar, P.2
Moore, J.T.3
Gunter, C.A.4
Nettles, S.5
-
30
-
-
0031682432
-
Secure execution of Java applets using a remote playground
-
(Oakland, Calif., May)
-
Malkhi, D., Reiter, M., and RUBIN, A. 1998. Secure execution of Java applets using a remote playground. In Proceedings of the 1998 IEEE Symposium on Security and Privacy (Oakland, Calif., May), 40-51.
-
(1998)
Proceedings of the 1998 IEEE Symposium on Security and Privacy
, pp. 40-51
-
-
Malkhi, D.1
Reiter, M.2
RUBIN, A.3
-
32
-
-
35248854918
-
Asynchronous Java exception handling in a real-time context
-
(Madrid, Dec.), NewMonics, Inc
-
Nilsen, K., Mitra, S., Sankaranarayanan, S., and Thanuvan, V. 1998. Asynchronous Java exception handling in a real-time context. In Proceedings of the IEEE Workshop on Programming Languages for Real-Time Industrial Applications (Madrid, Dec.), NewMonics, Inc.
-
(1998)
Proceedings of the IEEE Workshop on Programming Languages for Real-Time Industrial Applications
-
-
Nilsen, K.1
Mitra, S.2
Sankaranarayanan, S.3
Thanuvan, V.4
-
33
-
-
0004215165
-
The design of a new persistent object store for PJama
-
(Half Moon Bay, Calif.)
-
Printezis, T., Atkinson, M. P., Daynes, L., Spence, S., and Bailey, P. 1997. The design of a new persistent object store for PJama. In Proceedings of the Second International Workshop on Persistence and Java (PJW2) (Half Moon Bay, Calif.).
-
(1997)
Proceedings of the Second International Workshop on Persistence and Java (PJW2)
-
-
Printezis, T.1
Atkinson, M.P.2
Daynes, L.3
Spence, S.4
Bailey, P.5
-
34
-
-
0018984007
-
Pilot: An operating system for a personal computer
-
(Feb.)
-
Redell, D., Dalal, Y., Horsley, T., Lauer, H., Lynch, W., Mcjones, P., Murray, H., and Purcell, S. 1980. Pilot: An operating system for a personal computer. Commun. ACM23, 2 (Feb.), 81-92.
-
(1980)
Commun. ACM23
, vol.2
, pp. 81-92
-
-
Redell, D.1
Dalal, Y.2
Horsley, T.3
Lauer, H.4
Lynch, W.5
Mcjones, P.6
Murray, H.7
Purcell, S.8
-
35
-
-
0041350423
-
Design and implementation of a distributed virtual machine for networked computers
-
(Kiawah Island, S. C., Dec.), ACM, New York
-
Sirer, E. G., Grimm, R., Gregory, A. J., and Bershad, B. N. 1999. Design and implementation of a distributed virtual machine for networked computers. In Proceedings of the Seventeenth ACM Symposium on Operating System Principles (Kiawah Island, S. C., Dec.), ACM, New York, 202-216.
-
(1999)
Proceedings of the Seventeenth ACM Symposium on Operating System Principles
, pp. 202-216
-
-
Sirer, E.G.1
Grimm, R.2
Gregory, A.J.3
Bershad, B.N.4
-
36
-
-
0031679133
-
A type system for Java bytecode subroutines
-
(Jan.), ACM, New York
-
Stata, R.and Abadi, M. 1998. A type system for Java bytecode subroutines. In Proceedings of the 25th ACM Symposium on Principles of Programming Languages (Jan.), ACM, New York, 149-160.
-
(1998)
Proceedings of the 25th ACM Symposium on Principles of Programming Languages
, pp. 149-160
-
-
Stata, R.1
Abadi, M.2
-
37
-
-
85025412901
-
Sun Microsystems
-
Sun Microsystems, Palo Alto, Calif
-
Sun Microsystems. 1990. ptrace(2) Manual Page. Sun Microsystems, Palo Alto, Calif.
-
(1990)
ptrace(2) Manual Page.
-
-
-
38
-
-
0022795698
-
A structural view of the Cedar programming environment
-
(Oct.)
-
Swinehart, D. C., Zellweger, P. T., Beach, R. J., and Hagmann, R. B. 1986. A structural view of the Cedar programming environment. ACM Trans. Program. Lang. Syst. 8, 4 (Oct.), 419-490.
-
(1986)
ACM Trans. Program. Lang. Syst.
, vol.8
, pp. 419-490
-
-
Swinehart, D.C.1
Zellweger, P.T.2
Beach, R.J.3
Hagmann, R.B.4
-
41
-
-
0031542975
-
Extensible security architectures for Java
-
(Saint-Malo, France, Oct.)
-
Wallach, D. S., Balfanz, D., Dean, D., and Felten, E. W. 1997. Extensible security architectures for Java. In Proceedings of the Sixteenth ACM Symposium on Operating System Principles (Saint-Malo, France, Oct.), 116-128.
-
(1997)
Proceedings of the Sixteenth ACM Symposium on Operating System Principles
, pp. 116-128
-
-
Wallach, D.S.1
Balfanz, D.2
Dean, D.3
Felten, E.W.4
-
42
-
-
0039334688
-
The security architecture formerly known as stack inspection: A security mechanism for language-based systems
-
(Oct.)
-
Wallach, D. S., Felten, E. W., and Appel, A. W. 2000. The security architecture formerly known as stack inspection: A security mechanism for language-based systems. ACM Trans. Soft. Eng. Method. 9, 4 (Oct.), 341-378.
-
(2000)
ACM Trans. Soft. Eng. Method.
, vol.9
, pp. 341-378
-
-
Wallach, D.S.1
Felten, E.W.2
Appel, A.W.3
|