Virtual machine service access

JS Beda III, R Kedia - US Patent 8,800,009, 2014 - Google Patents
Methods, systems, and apparatus, including computer programs encoded on computer
storage media, for accessing services from a virtual machine. One of the methods includes …

Using Hardware Performance Monitors to Understand the Behavior of Java Applications.

PF Sweeney, M Hauswirth, B Cahoon… - … Machine Research and …, 2004 - usenix.org
Modern Java programs, such as middleware and application servers, include many complex
software components. Improving the performance of these Java applications requires a …

Authentication based on proximity to mobile device

JBM Queru - US Patent 9,769,662, 2017 - Google Patents
Methods, systems, and apparatus, including computer programs encoded on a computer
storage medium, for performing multi-factor authentication. In one aspect, a method includes …

Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders

E Bodden, A Sewe, J Sinschek, H Oueslati… - Proceedings of the 33rd …, 2011 - dl.acm.org
Static program analyses and transformations for Java face many problems when analyzing
programs that use reflection or custom class loaders: How can a static analysis know which …

Efficient and precise datarace detection for multithreaded object-oriented programs

JD Choi, K Lee, A Loginov, R O'Callahan… - Proceedings of the …, 2002 - dl.acm.org
We present a novel approach to dynamic datarace detection for multithreaded object-
oriented programs. Past techniques for on-the-fly datarace detection either sacrificed …

Adaptive optimization in the Jalapeno JVM

M Arnold, S Fink, D Grove, M Hind… - Proceedings of the 15th …, 2000 - dl.acm.org
Future high-performance virtual machines will improve performance through sophisticated
online feedback-directed optimizations. this paper presents the architecture of the Jalapeño …

A study on garbage collection algorithms for big data environments

R Bruno, P Ferreira - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
The need to process and store massive amounts of data—Big Data—is a reality. In areas
such as scientific experiments, social networks management, credit card fraud detection …

Garbage-first garbage collection

D Detlefs, C Flood, S Heller, T Printezis - Proceedings of the 4th …, 2004 - dl.acm.org
Garbage-First is a server-style garbage collector, targeted for multi-processors with large
memories, that meets a soft real-time goal with high probability, while achieving high …

Virtual network protocol

C Petrescu-Prahova, C Kern, EK Anderson… - US Patent …, 2015 - Google Patents
56 Ref Cited s (56) eerees ea secret key for the Source virtual machine, the secret key not
US PATENT DOCUMENTS being known by a destination virtual machine; obtaining a …

A framework for reducing the cost of instrumented code

M Arnold, BG Ryder - Proceedings of the ACM SIGPLAN 2001 …, 2001 - dl.acm.org
Instrumenting code to collect profiling information can cause substantial execution
overhead. This overhead makes instrumentation difficult to perform at runtime, often …