Filters








13 Hits in 5.4 sec

D4.1 Programming Language And Runtime System: Requirements

Hans Vandierendonck
2016 Zenodo  
This document elaborates the requirements for the VINEYARD programming model and runtime system.  ...  Java-C Bindings The Java Native Interface (JNI) 14 is the basic mechanism for creating bindings between Java programs and low-level, machine-specific software.  ...  It bridges the diversity in programming models and hardware through HSAIL 19 , a virtual instruction set architecture (ISA).  ... 
doi:10.5281/zenodo.898162 fatcat:h4qoibk26vfzdao5badtj6fdie

Dimension

Jing Yang, Shukang Zhou, Mary Lou Soffa
2006 Proceedings of the 2nd international conference on Virtual execution environments - VEE '06  
execution environments.  ...  This paper presents Dimension, a flexible tool that provides instrumentation services for a variety of VEEs.  ...  We also thank the anonymous reviewers for their useful suggestions and comments on how to improve the paper.  ... 
doi:10.1145/1134760.1220165 fatcat:evuvze5atncnxeyilp5odzzlc4

JIST: Just-In-Time Scheduling Translation for Parallel Processors

Giovanni Agosta, Stefano Crespi Reghizzi, Gerlando Falauto, Martino Sykora
2005 Scientific Programming  
We have implemented JIST, a Virtual Machine and JIT compiler for Java Bytecode targeted to a VLIW processor.  ...  Dynamic compilation makes it possible to bridge the gap between the two technologies, but special attention must be paid to software instruction scheduling, a must for the VLIW architectures.  ...  Acknowledgments The authors wish to acknowledge Giuseppe Desoli, Marco Garatti and Erven Rohou of STMicroelectronics labs in Manno (CH) for their support.  ... 
doi:10.1155/2005/127158 fatcat:r7ocvvmrcrbd3m36nfjhpm6ini

Secure Compilation (Dagstuhl Seminar 18201)

Amal Ahmed, Deepak Garg, Catalin Hritcu, Frank Piessens, Michael Wagner
2018 Dagstuhl Reports  
This seminar strived to take a broad and inclusive view of secure compilation and to provide a forum for discussion on the topic.  ...  For a concrete example, all modern languages provide a notion of structured control flow and an invoked procedure is expected to return to the right place.  ...  In the CHERI JNI work presented at ASPLOS last year, we demonstrated one possible way of allowing untrusted native code (including unverified assembly code) to exist in the same process as Java code, with  ... 
doi:10.4230/dagrep.8.5.1 dblp:journals/dagstuhl-reports/Ahmed0HP18 fatcat:tis2hemo4je7ni3wr5z6cza3iu

Software system for multi-criteria planning and management of hybrid microgrids

Marko Batic, Sanja Vranes
2019 2019 27th Telecommunications Forum (TELFOR)  
The underlying microgrid management methodology complements existing approaches that optimize energy imports for a desired demand and available storages, by introducing appliance-level demand response  ...  Following is a breakdown of concrete results and outputs with emphasis on their specific advancements comparted to existing approaches.  ...  the Java Native Interface (JNI).  ... 
doi:10.1109/telfor48224.2019.8971289 fatcat:yrbrug4ecvfirp4lzps5p6n7v4

JIST: Just-in-Time Scheduling Translation for Parallel Processors

G. Agosta, S.C. Reghizzi, G. Falauto, M. Sykora
Third International Symposium on Parallel and Distributed Computing/Third International Workshop on Algorithms, Models and Tools for Parallel Computing on Heterogeneous Networks  
We have implemented JIST, a Virtual Machine and JIT compiler for Java Bytecode targeted to a VLIW processor.  ...  Dynamic compilation makes it possible to bridge the gap between the two technologies, but special attention must be paid to software instruction scheduling, a must for the VLIW architectures.  ...  Acknowledgments The authors wish to acknowledge Giuseppe Desoli, Marco Garatti and Erven Rohou of STMicroelectronics labs in Manno (CH) for their support.  ... 
doi:10.1109/ispdc.2004.32 dblp:conf/ispdc/AgostaCFS04 fatcat:c2e2hqjjqbabrkifht224au7qu

Secure Compilation (Dagstuhl Seminar 21481)

David Chisnall, Deepak Garg, Catalin Hritcu, Mathias Payer
2022
This seminar strived to take a broad and inclusive view of secure compilation and to provide a forum for discussion on the topic.  ...  For a concrete example, all modern languages provide a notion of structured control flow and an invoked procedure is expected to return to the right place.  ...  For example, Robusta, Arabica, and CHERI-JNI all provided safe interoperability between Java and native code, but did not escape the lab.  ... 
doi:10.4230/dagrep.11.10.173 fatcat:v7g6lttnobewnkcwkf5uxsanuy

CopperDroid: Automatic Reconstruction of Android Malware Behaviors

Kimberly Tam, Salahuddin J. Khan, Aristide Fattori, Lorenzo Cavallaro
2015 Proceedings 2015 Network and Distributed System Security Symposium   unpublished
Because CopperDroid's reconstruction mechanisms are agnostic to the underlying action invocation methods, it is able to capture actions initiated both from Java and native code execution.  ...  Additionally, we demonstrate how CopperDroid can be leveraged to disclose additional behaviors through the use of a simple, yet effective, app stimulation technique.  ...  ACKNOWLEDGMENTS This research has been partially supported by the UK EPSRC grant EP/L022710/1 and by a generous donation from Intel Security (McAfee Labs).  ... 
doi:10.14722/ndss.2015.23145 fatcat:mvgmqe5t7rdtbep23pejhrp7fu

Unifying software and hardware of multithreaded reconfigurable applications within operating system processes

Miljan Vuletic
2006
We introduce a unified Operating System (OS) process for codesigned reconfigurable applications that provides (1) unified memory abstraction for software and hardware application parts, (2) execution transfers  ...  Apart from being a great thesis advisor, Paolo was a steady companion for a pint of ale and a handful of conversation, after long working days at conferences and meetings.  ...  The University of Calgary [97] has developed Virtual Socket framework for the Wildcard II reconfigurable PC card (shown in Figure F .1) from Annapolis Micro Systems [7] .  ... 
doi:10.5075/epfl-thesis-3626 fatcat:p4yjfbib7jd73ch2rvr5t7uqcy

DISCOVERING ANOMALOUS BEHAVIORS BY ADVANCED PROGRAM ANALYSIS TECHNIQUES [article]

ALESSANDRO REINA
2014
Malicious programs, in fact, are a serious threat for the security and privacy of billions of users.  ...  Cybercrime is a very dangerous threat which consists of, for instance, stealing credentials of bank accounts, sending SMS to premium number, stealing user sensitive information, using resources of infected  ...  Acknowledgements Getting a PhD means being thankful to the people that have crossed my street . . . how many . . . I gotta be formal, at least for the first paragraph.  ... 
doi:10.13130/reina-alessandro_phd2014-03-18 fatcat:h37h43zsenb5nf7uknk6o3cnga

23rd CERN School of Computing [article]

Carlo E Vandoni
2000
The CINT C++ interpreter allows use of (almost) the same code for both interactive and compiled execution.  ...  parallel execution of ROOT analysis jobs, and others.  ...  ACKNOWLEDGEMENTS We wish to thank the organizers of the 2000 CERN School of Computing for a stimulating school.  ... 
doi:10.5170/cern-2000-013 fatcat:j22n4uisuvhjhebb4fuu5ix5wy

Advancing Operating Systems via Aspect-Oriented Programming

Michael Engel, Mathematik Und Informatik, Freisleben, Bernd (Prof. Dr.)
2011
To be used in operating systems, AOSD requires tool support for the prevalent procedu- ral programming style as well as support for weaving aspects.  ...  Based on TOSKANA, applications for this dynamic aspect technology are discussed and eva [...]  ...  This legacy code is usually integrated into the application using shared libraries that communicate with the Java code using the Java Native Interface (JNI) [128] .  ... 
doi:10.17192/z2006.0138 fatcat:ojsjec4yizfyxli3h6pqgr2v5e

"Bolt-on" Network Security for Advanced Manufacturing Deployments

Matthew Mccormack
2021
This dissertation aims to design a practical system for defending manufacturing deployments from network attacks.  ...  Such a bolt-on approach allows for protecting existing machines without requiring modifications to the machines or their software.  ...  As the hypervisor extensions are in C and the controller in Java, we build a shared library that performs the hypercalls and leverage a Java Native Interface (JNI) to integrate these into the controller's  ... 
doi:10.1184/r1/14666271 fatcat:f5afqwqvlzbopoyiy2plzenuim