A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
D4.1 Programming Language And Runtime System: Requirements
2016
Zenodo
This document elaborates the requirements for the VINEYARD programming model and runtime system. ...
Java-C Bindings The Java Native Interface (JNI) 14 is the basic mechanism for creating bindings between Java programs and low-level, machine-specific software. ...
It bridges the diversity in programming models and hardware through HSAIL 19 , a virtual instruction set architecture (ISA). ...
doi:10.5281/zenodo.898162
fatcat:h4qoibk26vfzdao5badtj6fdie
Dimension
2006
Proceedings of the 2nd international conference on Virtual execution environments - VEE '06
execution environments. ...
This paper presents Dimension, a flexible tool that provides instrumentation services for a variety of VEEs. ...
We also thank the anonymous reviewers for their useful suggestions and comments on how to improve the paper. ...
doi:10.1145/1134760.1220165
fatcat:evuvze5atncnxeyilp5odzzlc4
JIST: Just-In-Time Scheduling Translation for Parallel Processors
2005
Scientific Programming
We have implemented JIST, a Virtual Machine and JIT compiler for Java Bytecode targeted to a VLIW processor. ...
Dynamic compilation makes it possible to bridge the gap between the two technologies, but special attention must be paid to software instruction scheduling, a must for the VLIW architectures. ...
Acknowledgments The authors wish to acknowledge Giuseppe Desoli, Marco Garatti and Erven Rohou of STMicroelectronics labs in Manno (CH) for their support. ...
doi:10.1155/2005/127158
fatcat:r7ocvvmrcrbd3m36nfjhpm6ini
Secure Compilation (Dagstuhl Seminar 18201)
2018
Dagstuhl Reports
This seminar strived to take a broad and inclusive view of secure compilation and to provide a forum for discussion on the topic. ...
For a concrete example, all modern languages provide a notion of structured control flow and an invoked procedure is expected to return to the right place. ...
In the CHERI JNI work presented at ASPLOS last year, we demonstrated one possible way of allowing untrusted native code (including unverified assembly code) to exist in the same process as Java code, with ...
doi:10.4230/dagrep.8.5.1
dblp:journals/dagstuhl-reports/Ahmed0HP18
fatcat:tis2hemo4je7ni3wr5z6cza3iu
Software system for multi-criteria planning and management of hybrid microgrids
2019
2019 27th Telecommunications Forum (TELFOR)
The underlying microgrid management methodology complements existing approaches that optimize energy imports for a desired demand and available storages, by introducing appliance-level demand response ...
Following is a breakdown of concrete results and outputs with emphasis on their specific advancements comparted to existing approaches. ...
the Java Native Interface (JNI). ...
doi:10.1109/telfor48224.2019.8971289
fatcat:yrbrug4ecvfirp4lzps5p6n7v4
JIST: Just-in-Time Scheduling Translation for Parallel Processors
Third International Symposium on Parallel and Distributed Computing/Third International Workshop on Algorithms, Models and Tools for Parallel Computing on Heterogeneous Networks
We have implemented JIST, a Virtual Machine and JIT compiler for Java Bytecode targeted to a VLIW processor. ...
Dynamic compilation makes it possible to bridge the gap between the two technologies, but special attention must be paid to software instruction scheduling, a must for the VLIW architectures. ...
Acknowledgments The authors wish to acknowledge Giuseppe Desoli, Marco Garatti and Erven Rohou of STMicroelectronics labs in Manno (CH) for their support. ...
doi:10.1109/ispdc.2004.32
dblp:conf/ispdc/AgostaCFS04
fatcat:c2e2hqjjqbabrkifht224au7qu
Secure Compilation (Dagstuhl Seminar 21481)
2022
This seminar strived to take a broad and inclusive view of secure compilation and to provide a forum for discussion on the topic. ...
For a concrete example, all modern languages provide a notion of structured control flow and an invoked procedure is expected to return to the right place. ...
For example, Robusta, Arabica, and CHERI-JNI all provided safe interoperability between Java and native code, but did not escape the lab. ...
doi:10.4230/dagrep.11.10.173
fatcat:v7g6lttnobewnkcwkf5uxsanuy
CopperDroid: Automatic Reconstruction of Android Malware Behaviors
2015
Proceedings 2015 Network and Distributed System Security Symposium
unpublished
Because CopperDroid's reconstruction mechanisms are agnostic to the underlying action invocation methods, it is able to capture actions initiated both from Java and native code execution. ...
Additionally, we demonstrate how CopperDroid can be leveraged to disclose additional behaviors through the use of a simple, yet effective, app stimulation technique. ...
ACKNOWLEDGMENTS This research has been partially supported by the UK EPSRC grant EP/L022710/1 and by a generous donation from Intel Security (McAfee Labs). ...
doi:10.14722/ndss.2015.23145
fatcat:mvgmqe5t7rdtbep23pejhrp7fu
Unifying software and hardware of multithreaded reconfigurable applications within operating system processes
2006
We introduce a unified Operating System (OS) process for codesigned reconfigurable applications that provides (1) unified memory abstraction for software and hardware application parts, (2) execution transfers ...
Apart from being a great thesis advisor, Paolo was a steady companion for a pint of ale and a handful of conversation, after long working days at conferences and meetings. ...
The University of Calgary [97] has developed Virtual Socket framework for the Wildcard II reconfigurable PC card (shown in Figure F .1) from Annapolis Micro Systems [7] . ...
doi:10.5075/epfl-thesis-3626
fatcat:p4yjfbib7jd73ch2rvr5t7uqcy
DISCOVERING ANOMALOUS BEHAVIORS BY ADVANCED PROGRAM ANALYSIS TECHNIQUES
[article]
2014
Malicious programs, in fact, are a serious threat for the security and privacy of billions of users. ...
Cybercrime is a very dangerous threat which consists of, for instance, stealing credentials of bank accounts, sending SMS to premium number, stealing user sensitive information, using resources of infected ...
Acknowledgements Getting a PhD means being thankful to the people that have crossed my street . . . how many . . . I gotta be formal, at least for the first paragraph. ...
doi:10.13130/reina-alessandro_phd2014-03-18
fatcat:h37h43zsenb5nf7uknk6o3cnga
23rd CERN School of Computing
[article]
2000
The CINT C++ interpreter allows use of (almost) the same code for both interactive and compiled execution. ...
parallel execution of ROOT analysis jobs, and others. ...
ACKNOWLEDGEMENTS We wish to thank the organizers of the 2000 CERN School of Computing for a stimulating school. ...
doi:10.5170/cern-2000-013
fatcat:j22n4uisuvhjhebb4fuu5ix5wy
Advancing Operating Systems via Aspect-Oriented Programming
2011
To be used in operating systems, AOSD requires tool support for the prevalent procedu- ral programming style as well as support for weaving aspects. ...
Based on TOSKANA, applications for this dynamic aspect technology are discussed and eva [...] ...
This legacy code is usually integrated into the application using shared libraries that communicate with the Java code using the Java Native Interface (JNI) [128] . ...
doi:10.17192/z2006.0138
fatcat:ojsjec4yizfyxli3h6pqgr2v5e
"Bolt-on" Network Security for Advanced Manufacturing Deployments
2021
This dissertation aims to design a practical system for defending manufacturing deployments from network attacks. ...
Such a bolt-on approach allows for protecting existing machines without requiring modifications to the machines or their software. ...
As the hypervisor extensions are in C and the controller in Java, we build a shared library that performs the hypercalls and leverage a Java Native Interface (JNI) to integrate these into the controller's ...
doi:10.1184/r1/14666271
fatcat:f5afqwqvlzbopoyiy2plzenuim