-
3
-
-
85084100141
-
Processes in KaffeOS: Isolation, resource management, and sharing in Java
-
San Diego, California, Oct
-
G. Back, W. C. Hsieh, and J. Lepreau. Processes in KaffeOS: Isolation, resource management, and sharing in Java. In Proceedings of the Fourth Symposium on Operating Systems Design and Implementation (OSDI 2000), San Diego, California, Oct. 2000. http://www.cs.utah.edu/flux/papers/kaffeos-osdi00-base.html.
-
(2000)
Proceedings of the Fourth Symposium on Operating Systems Design and Implementation (OSDI 2000)
-
-
Back, G.1
Hsieh, W. C.2
Lepreau, J.3
-
4
-
-
85084164536
-
Techniques for the design of Java Operating System
-
San Diego, California, June
-
G. Back, P. Tullmann, L. Stoller, W. C. Hsieh, and J. Lepreau. Techniques for the design of Java Operating System. In Proceedings of the 2000 Usenix Annual Technical Conference, San Diego, California, June 2000. http://www.cs.utah.edu/flux/papers/javaos-usenix00-base.html.
-
(2000)
Proceedings of the 2000 Usenix Annual Technical Conference
-
-
Back, G.1
Tullmann, P.2
Stoller, L.3
Hsieh, W. C.4
Lepreau, J.5
-
5
-
-
0039015799
-
Towards a resource-safe Java for service guarantees in uncooperative environments
-
Madrid, Spain, Dec
-
P. Bernadat, D. Lambright, and F. Travostino. Towards a resource-safe Java for service guarantees in uncooperative environments. In IEEE Workshop on Programming Languages for Real-Time Industrial Applications, Madrid, Spain, Dec. 1998.
-
(1998)
IEEE Workshop on Programming Languages for Real-Time Industrial Applications
-
-
Bernadat, P.1
Lambright, D.2
Travostino, F.3
-
6
-
-
0005372913
-
Automatic program transformation with JOIE
-
New Orleans, Louisiana, June
-
G. Cohen, J. Chase, and D. Kaminsky. Automatic program transformation with JOIE. In Proceedings of the 1998 Usenix Annual Technical Symposium, pages 167–178, New Orleans, Louisiana, June 1998.
-
(1998)
Proceedings of the 1998 Usenix Annual Technical Symposium
, pp. 167-178
-
-
Cohen, G.1
Chase, J.2
Kaminsky, D.3
-
7
-
-
0012073784
-
JRes: A resource accounting interface for Java
-
Vancouver, British Columbia, Oct
-
G. Czajkowski and T. von Eicken. JRes: A resource accounting interface for Java. In Proceedings of the ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications, pages 21–35, Vancouver, British Columbia, Oct. 1998.
-
(1998)
Proceedings of the ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications
, pp. 21-35
-
-
Czajkowski, G.1
von Eicken, T.2
-
9
-
-
0003396723
-
-
PhD thesis, Princeton University, Princeton, New Jersey, Nov
-
D. Dean. Formal Aspects of Mobile Code Security. PhD thesis, Princeton University, Princeton, New Jersey, Nov. 1998.
-
(1998)
Formal Aspects of Mobile Code Security
-
-
Dean, D.1
-
10
-
-
0037974167
-
Java security: Web browsers and beyond
-
D. E. Denning and P. J. Denning, editors, pages ACM Press, New York, New York, Oct
-
D. Dean, E. W. Felten, D. S. Wallach, and D. Balfanz. Java security: Web browsers and beyond. In D. E. Denning and P. J. Denning, editors, Internet Besieged: Countering Cyberspace Scofflaws, pages 241–269. ACM Press, New York, New York, Oct. 1997.
-
(1997)
Internet Besieged: Countering Cyberspace Scofflaws
, pp. 241-269
-
-
Dean, D.1
Felten, E. W.2
Wallach, D. S.3
Balfanz, D.4
-
12
-
-
0040199686
-
What is Java binary compatibility?
-
Vancouver, British Columbia, Oct
-
S. Drossopoulou, D. Wragg, and S. Eisenbach. What is Java binary compatibility? In Proceedings of the ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications, pages 341–358, Vancouver, British Columbia, Oct. 1998.
-
(1998)
Proceedings of the ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications
, pp. 341-358
-
-
Drossopoulou, S.1
Wragg, D.2
Eisenbach, S.3
-
13
-
-
0032218233
-
History-based access control for mobile code
-
San Francisco, California, Nov. ACM Press
-
G. Edjlali, A. Acharya, and V. Chaudhary. History-based access control for mobile code. In Proceedings of the 5th ACM Conference on Computer and Communications Security (CCS’98), pages 38–48, San Francisco, California, Nov. 1998. ACM Press.
-
(1998)
Proceedings of the 5th ACM Conference on Computer and Communications Security (CCS’98)
, pp. 38-48
-
-
Edjlali, G.1
Acharya, A.2
Chaudhary, V.3
-
16
-
-
0026913084
-
The revised report on the syntactic theories of sequential control and state
-
M. Felleisen and R. Hieb. The revised report on the syntactic theories of sequential control and state. Theoretical Computer Science, 102:235–271, 1992.
-
(1992)
Theoretical Computer Science
, vol.102
, pp. 235-271
-
-
Felleisen, M.1
Hieb, R.2
-
17
-
-
17144390777
-
Programming languages as operating systems (or revenge of the son of the Lisp machine)
-
Paris, France, Sept
-
M. Flatt, R. B. Findler, S. Krishnamurthy, and M. Felleisen. Programming languages as operating systems (or revenge of the son of the Lisp machine). In Proceedings of the 1999 ACM International Conference on Functional Programming (ICFP’99), Paris, France, Sept. 1999. http://www.cs.rice.edu/CS/PLT/Publications/icfp99-ffkf.ps.gz.
-
(1999)
Proceedings of the 1999 ACM International Conference on Functional Programming (ICFP’99)
-
-
Flatt, M.1
Findler, R. B.2
Krishnamurthy, S.3
Felleisen, M.4
-
18
-
-
0003801299
-
-
Addison-Wesley, Reading, Massachusetts, June
-
L. Gong. Inside Java 2 Platform Security: Architecture, API Design, and Implementation. Addison-Wesley, Reading, Massachusetts, June 1999.
-
(1999)
Inside Java 2 Platform Security: Architecture, API Design, and Implementation
-
-
Gong, L.1
-
19
-
-
0003518498
-
-
Addison-Wesley, Reading, Massachusetts
-
J. Gosling, B. Joy, and G. Steele. The Java Language Specification. Addison-Wesley, Reading, Massachusetts, 1996.
-
(1996)
The Java Language Specification
-
-
Gosling, J.1
Joy, B.2
Steele, G.3
-
20
-
-
85084164107
-
Implementing multiple protection domains in Java
-
New Orleans, Louisiana, June USENIX
-
C. Hawblitzel, C.-C. Chang, G. Czajkowski, D. Hu, and T. von Eicken. Implementing multiple protection domains in Java. In USENIX Annual Technical Conference, New Orleans, Louisiana, June 1998. USENIX.
-
(1998)
USENIX Annual Technical Conference
-
-
Hawblitzel, C.1
Chang, C.-C.2
Czajkowski, G.3
Hu, D.4
von Eicken, T.5
-
21
-
-
17244380228
-
PLAN: A Packet Language for Active Networks
-
ACM
-
M. Hicks, P. Kakkar, J. T. Moore, C. A. Gunter, and S. Nettles. PLAN: A Packet Language for Active Networks. In Proceedings of the Third ACM SIGPLAN International Conference on Functional Programming Languages, pages 86–93. ACM, 1998. http://www.cis.upenn.edu/switchware/papers/plan.ps.
-
(1998)
Proceedings of the Third ACM SIGPLAN International Conference on Functional Programming Languages
, pp. 86-93
-
-
Hicks, M.1
Kakkar, P.2
Moore, J. T.3
Gunter, C. A.4
Nettles, S.5
-
23
-
-
0031682432
-
Secure execution of Java applets using a remote playground
-
Oakland, California, May
-
D. Malkhi, M. Reiter, and A. Rubin. Secure execution of Java applets using a remote playground. In Proceedings of the 1998 IEEE Symposium on Security and Privacy, pages 40–51, Oakland, California, May 1998.
-
(1998)
Proceedings of the 1998 IEEE Symposium on Security and Privacy
, pp. 40-51
-
-
Malkhi, D.1
Reiter, M.2
Rubin, A.3
-
25
-
-
35248854918
-
Asynchronous Java exception handling in a real-time context
-
Madrid, Spain, Dec. NewMonics, Inc
-
K. Nilsen, S. Mitra, S. Sankaranarayanan, and V. Thanuvan. Asynchronous Java exception handling in a real-time context. In IEEE Workshop on Programming Languages for Real-Time Industrial Applications, Madrid, Spain, Dec. 1998. NewMonics, Inc. http://www.newmonics.com/news/conferences/ rtss/plrtia/async.exception.pdf.
-
(1998)
IEEE Workshop on Programming Languages for Real-Time Industrial Applications
-
-
Nilsen, K.1
Mitra, S.2
Sankaranarayanan, S.3
Thanuvan, V.4
-
26
-
-
84976247162
-
Design and implementation of a distributed virtual machine for networked computers
-
Kiawah Island Resort, South Carolina, Dec. ACM
-
E. G. Sirer, R. Grimm, A. J. Gregory, and B. N. Bershad. Design and implementation of a distributed virtual machine for networked computers. In Proceedings of the Seventeenth ACM Symposium on Operating System Principles, pages 202–216, Kiawah Island Resort, South Carolina, Dec. 1999. ACM.
-
(1999)
Proceedings of the Seventeenth ACM Symposium on Operating System Principles
, pp. 202-216
-
-
Sirer, E. G.1
Grimm, R.2
Gregory, A. J.3
Bershad, B. N.4
-
30
-
-
0031542975
-
Extensible security architectures for Java
-
Saint-Malo, France, Oct
-
D. S. Wallach, D. Balfanz, D. Dean, and E. W. Felten. Extensible security architectures for Java. In Proceedings of the Sixteenth ACM Symposium on Operating System Principles, pages 116–128, Saint-Malo, France, Oct. 1997.
-
(1997)
Proceedings of the Sixteenth ACM Symposium on Operating System Principles
, pp. 116-128
-
-
Wallach, D. S.1
Balfanz, D.2
Dean, D.3
Felten, E. W.4
|