{ORC}: Increasing Cloud Memory Density via Object Reuse with Capabilities
Cloud environments host many tenants, and typically there is substantial overlap between
the application binaries and libraries executed by tenants. Thus, memory de-duplication can …
the application binaries and libraries executed by tenants. Thus, memory de-duplication can …
Tagged architecture: how compelling are its advantages?
EF Gehringer, JL Keedy - ACM SIGARCH Computer Architecture News, 1985 - dl.acm.org
Traditionally, instruction sets have included separate instructions for manipulating different
data types, such as integers and real numbers. A long-discussed but seldomimplemented …
data types, such as integers and real numbers. A long-discussed but seldomimplemented …
A secure distributed capability based system
HL Johnson, JF Koegel, RM Koegel - … on The range of computing: mid …, 1985 - dl.acm.org
A novel desi n for a secure distributed system is described and evaluated. A capabi ity
based computer architecture is combined with crypto-3. graphic network security techniques …
based computer architecture is combined with crypto-3. graphic network security techniques …
Encrypted pointers in protection system design
L Lopriore - The Computer Journal, 2012 - academic.oup.com
A salient aspect of protection system design is the set of the mechanisms for the
representation, distribution, verification and revocation of access privileges. With reference …
representation, distribution, verification and revocation of access privileges. With reference …
Abstraction mechanisms for event control in program debugging
B Lazzerini, L Lopriore - IEEE transactions on software …, 1989 - ieeexplore.ieee.org
In the event-action model of interactions between the debugging system and the program
being debugged, an event will occur on the evaluation of a conditional defined in terms of …
being debugged, an event will occur on the evaluation of a conditional defined in terms of …
DISDEB: an interactive high-level debugging system for a multi-microprocessor system
B Lazzerini, CA Prete - Microprocessing and Microprogramming, 1986 - Elsevier
This paper describes the architecture of the interactive debugging system DISDEB, which is
intended to debug programs on a multi-microprocessor system constituting a node of the …
intended to debug programs on a multi-microprocessor system constituting a node of the …
An implementation of storage management in capability environments
P Corsini, L Lopriore - Software: Practice and Experience, 1995 - Wiley Online Library
The exploitation of the salient features of capability‐based addressing environments leads
to a high number of small objects existing in memory at the same time. It is thus necessary to …
to a high number of small objects existing in memory at the same time. It is thus necessary to …
The architecture of a capability-based microprocessor system
P Corsini, L Lopriore - IEEE Micro, 1987 - ieeexplore.ieee.org
The Architecture of a Capability-Based Microprocessor System Page 1 FEAT U RE By
implementing a capabilityoriented addressing scheme, tagged storage, and a single-level-store …
implementing a capabilityoriented addressing scheme, tagged storage, and a single-level-store …
A user interface specification for a program debugging and measuring environment
L Lopriore - Software: Practice and Experience, 1989 - Wiley Online Library
A high level of complexity is involved in program dynamics. A number of tools have been
developed to assist the programmer in mastering this complexity in the various phases of …
developed to assist the programmer in mastering this complexity in the various phases of …
Access privilege management in protection systems
L Lopriore - Information and Software Technology, 2002 - Elsevier
We consider the problem of managing access privileges on protected objects. We associate
one or more locks with each object, one lock for each access right defined by the object type …
one or more locks with each object, one lock for each access right defined by the object type …