Academic literature on the topic 'System call virtual machine'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'System call virtual machine.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "System call virtual machine"

1

Zhang, Ruirui, and Xin Xiao. "Study of Immune-Based Intrusion Detection Technology in Virtual Machines for Cloud Computing Environment." Mobile Information Systems 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/2301970.

Full text
Abstract:
Cloud computing platforms are usually based on virtual machines as the underlying architecture; the security of virtual machine systems is the core of cloud computing security. This paper presents an immune-based intrusion detection model in virtual machines of cloud computing environment, denoted as IB-IDS, to ensure the safety of user-level applications in client virtual machines. In the model, system call sequences and their parameters of processes are used, and environment information in the client virtual machines is extracted. Then the model simulates immune responses to ensure the state of user-level programs, which can detect attacks on the dynamic runtime of applications and has high real-time performance. There are five modules in the model: antigen presenting module, signal acquisition module, immune response module, signal measurement module, and information monitoring module, which are distributed into different levels of virtual machine environment. Performance analysis and experimental results show that the model brings a small performance overhead for the virtual machine system and has a good detection performance. It is applicable to judge the state of user-level application in guest virtual machine, and it is feasible to use it to increase the user-level security in software services of cloud computing platform.
APA, Harvard, Vancouver, ISO, and other styles
2

Sok, Song-Woo, Young-Woo Jung, and Cheol-Hun Lee. "Optimizing System Call Latency of ARM Virtual Machines." Journal of Physics: Conference Series 787 (January 2017): 012032. http://dx.doi.org/10.1088/1742-6596/787/1/012032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

PARVEEN, TAUHIDA, SCOTT TILLEY, WILLIAM ALLEN, GERALD MARIN, and RICHARD FORD. "DETECTING EMULATED ENVIRONMENTS." International Journal of Software Engineering and Knowledge Engineering 22, no. 07 (November 2012): 927–44. http://dx.doi.org/10.1142/s0218194012500258.

Full text
Abstract:
One of the most powerful tools in the hacker's reverse engineering arsenal is the virtual machine. These systems provide a simple mechanism for executing code in an environment in which the program can be carefully monitored and controlled, allowing attackers to subvert copy protection and access trade secrets. One of the challenges for anti-reverse engineering tools is how to protect software within such an untrustworthy environment. From the perspective of a running program, detecting an emulated environment is not trivial: the attacker can emulate the result of different operations with arbitrarily high fidelity. This paper demonstrates a mechanism that is able to detect even carefully constructed virtual environments by focusing on the stochastic variation of system call timings. A statistical technique for detecting emulated environments is presented, which uses a model of normal system call behavior to successfully identify two commonly used virtual environments under realistic conditions.
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Xin Wei, Yin Shan Jia, Chun Hua Yu, Zi Long Chen, Cheng Wang, and Da Zhou Zhu. "Application of Java-Called DLL in Crop Breeding Data Analysis System." Applied Mechanics and Materials 543-547 (March 2014): 3243–47. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3243.

Full text
Abstract:
The collected massive data during the breeding process usually cost plenty of human power. Therefore, it is urgent to create highly-efficient specific breeding data analysis software to assist breeders to screen fine varieties. For this reason, this paper developed a breeding data management analysis system by taking MyEclipse as development tool, which covers various statistical analysis techniques. In the development process of each algorithm module, JNI technology is adopted to realize Java-called DLL and complete algorithm call, improving the execution efficiency of a large number of arithmetical operations. This paper introduced Java-called DLL by aid of JNI technology in One-Way ANOVA in details and the parameter passing between Java and C++ and how to realize Java-called DLL in the operating system without C++ operating environment. Through the above-mentioned call, the advantages of C++ and Java are comprehensively considered, which not only lightens the burden of Java virtual machine and avoids the repeatability, but also improves the efficiency of arithmetical operation and the utilization rate of codes.
APA, Harvard, Vancouver, ISO, and other styles
5

Sperber, Michael, and Lennart Augustsson. "Special Issue on Run-Time Systems and Target Platforms for Functional Languages: Editorial." Journal of Functional Programming 24, no. 6 (November 2014): 612. http://dx.doi.org/10.1017/s0956796815000039.

Full text
Abstract:
Compiling functional languages to the existing variety of platforms calls for sophisticated implementations of run-time systems. This special issue focuses on this often-neglected aspect. We volunteered to compile this special issue in 2012 and immediately started soliciting papers. The original call for papers covered native-code platforms as well as run-time systems originally designed for non-functional languages such as the Java Virtual Machine or the .NET Common Language Runtime.
APA, Harvard, Vancouver, ISO, and other styles
6

Sato, Masaya, Hideo Taniguchi, and Toshihiro Yamauchi. "Design and implementation of hiding method for file manipulation of essential services by system call proxy using virtual machine monitor." International Journal of Space-Based and Situated Computing 9, no. 1 (2019): 1. http://dx.doi.org/10.1504/ijssc.2019.100007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sato, Masaya, Hideo Taniguchi, and Toshihiro Yamauchi. "Design and implementation of hiding method for file manipulation of essential services by system call proxy using virtual machine monitor." International Journal of Space-Based and Situated Computing 9, no. 1 (2019): 1. http://dx.doi.org/10.1504/ijssc.2019.10021589.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Umamaheswari, K., and S. Sujatha. "Impregnable Defence Architecture using Dynamic Correlation-based Graded Intrusion Detection System for Cloud." Defence Science Journal 67, no. 6 (November 6, 2017): 645. http://dx.doi.org/10.14429/dsj.67.11118.

Full text
Abstract:
<p class="p1">Data security and privacy are perennial concerns related to cloud migration, whether it is about applications, business or customers. In this paper, novel security architecture for the cloud environment designed with intrusion detection and prevention system (IDPS) components as a graded multi-tier defense framework. It is a defensive formation of collaborative IDPS components with dynamically revolving alert data placed in multiple tiers of virtual local area networks (VLANs). The model has two significant contributions for impregnable protection, one is to reduce alert generation delay by dynamic correlation and the second is to support the supervised learning of malware detection through system call analysis. The defence formation facilitates malware detection with linear support vector machine- stochastic gradient descent (SVM-SGD) statistical algorithm. It requires little computational effort to counter the distributed, co-ordinated attacks efficiently. The framework design, then, takes distributed port scan attack as an example for assessing the efficiency in terms of reduction in alert generation delay, the number of false positives and learning time through comparison with existing techniques is discussed.</p>
APA, Harvard, Vancouver, ISO, and other styles
9

Xu, Zonggang. "Social Governance Structure Construction and Resource Allocation Methods under the Management Mode of the Internet of Things." Wireless Communications and Mobile Computing 2021 (July 20, 2021): 1–12. http://dx.doi.org/10.1155/2021/7963311.

Full text
Abstract:
Aiming at the problems in the social governance structure level under the management mode of the Internet of Things, this paper designs a network agent based on the idea of service grid construction that has the functions of service resource configuration discovery, load balancing, and protocol conversion. Using it as a service governance infrastructure reduces the coupling between business services and service governance, and the network agent will intercept the service call traffic within the platform to achieve cross-protocol and cross-frame service communication. Through the proposed global query decomposition strategy and algorithm, a global query mapping is realized, which solves the problem of global query decomposition based on the global data model. We designed the unified management mechanism of two commonly used IoT databases based on XML. This process involves the realization of heterogeneous Internet of Things database resource configuration, data mode conversion, and global query mapping. Among them, in the process of data schema conversion, the conflict of the data in the schema mapping is resolved, the XML Schema is generated, the schema mapping metadata is established, and the XML document of the data is generated. We build a framework for optimal allocation of cloud computing resources based on load forecasting and propose an adaptive elastic control system for resource allocation based on resource status monitoring and demand forecasting. In view of the low resource utilization problem caused by the resource management mode of single virtual machine serving single user adopted by Internet of Things service providers, this paper constructs a new public cloud architecture with a five-layer structure. On the basis of this architecture, an adaptive configuration mode of virtualized resources based on a single virtual machine serving multiple users is proposed. This mode can automatically search for optimal virtualization resources for application resource requests made by different users and run different applications on the same virtual machine without affecting the quality of service, so that IoT providers can guarantee services. At the same time, it improves the utilization efficiency of IoT resources and reduces energy consumption.
APA, Harvard, Vancouver, ISO, and other styles
10

Lin, Ying-Dar, and Chun-Ying Huang. "Three-Phase Detection and Classification for Android Malware Based on Common Behaviors." Journal of Communications Software and Systems 12, no. 3 (September 21, 2016): 157. http://dx.doi.org/10.24138/jcomss.v12i3.80.

Full text
Abstract:
Android is one of the most popular operating systems used in mobile devices. Its popularity also renders it a common target for attackers. We propose an efficient and accurate three-phase behavior-based approach for detecting and classifying malicious Android applications. In the proposedapproach, the first two phases detect a malicious application and the final phase classifies the detected malware. The first phase quickly filters out benign applications based on requested permissions and the remaining samples are passed to the slower second phase, which detects malicious applications based on system call sequences. The final phase classifies malware into known or unknown types based on behavioral or permission similarities. Our contributions are three-fold: First, we propose a self-contained approach for Android malware identification and classification. Second, we show that permission requests from an Application are beneficial to benign application filtering. Third, we show that system call sequences generated from an application running inside a virtual machine can be used for malware detection. The experiment results indicate that the multi-phase approach is more accurate than the single-phase approach. The proposed approach registered true positive and false positive rates of 97% and 3%, respectively. In addition, more than 98% of the samples were correctly classified into known or unknown types of malware based on permission similarities.We believe that our findings shed some lights on future development of malware detection and classification.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "System call virtual machine"

1

Cardace, Antonio. "UMView, a Userspace Hypervisor Implementation." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/13184/.

Full text
Abstract:
UMView is a partial virtual machine and userspace hypervisor capable of intercepting system calls and modifying their behavior according to the calling process' view. In order to provide flexibility and modularity UMView supports modules loadable at runtime using a plugin architecture. UMView in particular is the implementation of the View-OS concept which negates the global view assumption which is so radically established in the world of OSes and virtualization.
APA, Harvard, Vancouver, ISO, and other styles
2

Pareschi, Federico. "Applying partial virtualization on ELF binaries through dynamic loaders." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2013. http://amslaurea.unibo.it/5065/.

Full text
Abstract:
The technology of partial virtualization is a revolutionary approach to the world of virtualization. It lies directly in-between full system virtual machines (like QEMU or XEN) and application-related virtual machines (like the JVM or the CLR). The ViewOS project is the flagship of such technique, developed by the Virtual Square laboratory, created to provide an abstract view of the underlying system resources on a per-process basis and work against the principle of the Global View Assumption. Virtual Square provides several different methods to achieve partial virtualization within the ViewOS system, both at user and kernel levels. Each of these approaches have their own advantages and shortcomings. This paper provides an analysis of the different virtualization methods and problems related to both the generic and partial virtualization worlds. This paper is the result of an in-depth study and research for a new technology to be employed to provide partial virtualization based on ELF dynamic binaries. It starts with a mild analysis of currently available virtualization alternatives and then goes on describing the ViewOS system, highlighting its current shortcomings. The vloader project is then proposed as a possible solution to some of these inconveniences with a working proof of concept and examples to outline the potential of such new virtualization technique. By injecting specific code and libraries in the middle of the binary loading mechanism provided by the ELF standard, the vloader project can promote a streamlined and simplified approach to trace system calls. With the advantages outlined in the following paper, this method presents better performance and portability compared to the currently available ViewOS implementations. Furthermore, some of itsdisadvantages are also discussed, along with their possible solutions.
APA, Harvard, Vancouver, ISO, and other styles
3

Whitaker, Andrew. "Building system services with virtual machine monitors /." Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/6855.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sharma, Ankur Kumar. "VPLACEMENT: Contention Aware Virtual Machine Placement System." Research Showcase @ CMU, 2014. http://repository.cmu.edu/theses/60.

Full text
Abstract:
Maximizing the number of cohosted virtual machines (VMs) while still maintaining the desired performance level is a critical goal in cloud. As we pack more virtual machines on a physical machine (PM), the resource contention increases, thereby affecting the response time. This virtual machine placement problem has been vastly studied and most of effort has been in either allocating more resources to virtual machines (resizing) or migrating them to a higher capacity PM based on the resource demand estimation. Studies have also shown that in the presence of resource contention the resource demand estimation mechanisms could predict more resource requirement than actually needed. Hence deciding virtual machine placement and allocated resources based on utilization estimation could lead to inefficient usage of PM resources. We propose a novel approach to solve this problem which focuses on overall application response time rather than individual virtual machines. Large scale applications are deployed as multi-tier components. These components interact with each other so that application can perform its task. Our placement algorithm uses the dependency relationship between these components to understand application response time behavior. Our solution focuses on reducing the performance degradation because of resource contention. We propose a VM placement system termed as Vplacement. This system uses the traffic analysis to understand the dependency relationship between application components. This dependency relationship and traffic analysis provides some vital iii data like impact of component processing time on application response time, the probability of resource contention between a pair of component nodes (coArrival Probability) etc. The impact and coarrival probability is used by the placement engine of Vplacement to minimize the degradation of application performance because of resource contention by cohosting the low impact component nodes together.
APA, Harvard, Vancouver, ISO, and other styles
5

Jayaraman, Arunkumar, and Pavankumar Rayapudi. "Comparative Study of Virtual Machine Software Packages with Real Operating System." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1952.

Full text
Abstract:
Virtualization allows computer users to utilize their resources more efficiently and effectively. Operating system that runs on top of the Virtual Machine or Hypervisor is called guest OS. The Virtual Machine is an abstraction of the real physical machine. The main aim of this thesis work was to analyze different kinds of virtualization software packages and to investigate their advantages and disadvantages. In addition, we analyzed the performance of the virtual software packages with a real operating system in terms of web services. Web Servers play an important role on the Internet. The response time and throughput for a web server are different for different virtualization software packages and between a real host and a virtual host. In this thesis, we analyzed the web server performance on Linux. We compared the throughput for three different virtualization software packages (VMware, QEMU, and Virtual Box). The performance results clearly indicate that the real machine performance is better than the performance of the virtual machines. VMware has the better performance compared to other virtual software packages.
APA, Harvard, Vancouver, ISO, and other styles
6

Ye, Lei. "Energy Management for Virtual Machines." Diss., The University of Arizona, 2013. http://hdl.handle.net/10150/283603.

Full text
Abstract:
Current computing infrastructures use virtualization to increase resource utilization by deploying multiple virtual machines on the same hardware. Virtualization is particularly attractive for data center, cloud computing, and hosting services; in these environments computer systems are typically configured to have fast processors, large physical memory and huge storage capable of supporting concurrent execution of virtual machines. Subsequently, this high demand for resources is directly translating into higher energy consumption and monetary costs. Increasingly managing energy consumption of virtual machines is becoming critical. However, virtual machines make the energy management more challenging because a layer of virtualization separates hardware from the guest operating system executing inside a virtual machine. This dissertation addresses the challenge of designing energy-efficient storage, memory and buffer cache for virtual machines by exploring innovative mechanisms as well as existing approaches. We analyze the architecture of an open-source virtual machine platform Xen and address energy management on each subsystem. For storage system, we study the I/O behavior of the virtual machine systems. We address the isolation between virtual machine monitor and virtual machines, and increase the burstiness of disk accesses to improve energy efficiency. In addition, we propose a transparent energy management on main memory for any types of guest operating systems running inside virtual machines. Furthermore, we design a dedicated mechanism for the buffer cache based on the fact that data-intensive applications heavily rely on a large buffer cache that occupies a majority of physical memory. We also propose a novel hybrid mechanism that is able to improve energy efficiency for any memory access. All the mechanisms achieve significant energy savings while lowering the impact on performance for virtual machines.
APA, Harvard, Vancouver, ISO, and other styles
7

Liang, Jiangang. "Development of logical models for CNC machine tool motion control system with application to virtual machine tool design /." For electronic version search Digital dissertations database. Restricted to UC campuses. Access is free to UC campus dissertations, 2005. http://uclibs.org/PID/11984.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sun, Yu. "JAVA VIRTUAL MACHINE DESIGN FOR EMBEDDED SYSTEMS: ENERGY, TIME PREDICTABILITY AND PERFORMANCE." OpenSIUC, 2010. https://opensiuc.lib.siu.edu/dissertations/186.

Full text
Abstract:
Embedded systems can be found everywhere in our daily lives. Due to the great variety of embedded devices, the platform independent Java language provides a good solution for embedded system development. Java virtual machine (JVM) is the most critical component of all kinds of Java platforms. Hence, it is extremely important to study the special design of JVM for embedded systems. The key challenges of designing a successful JVM for embedded systems are energy efficiency, time predictability and performance, which are investigated in this dissertation, respectively. We first study the energy issue of JVM on embedded systems. With a cycle-accurate simulator, we study each stage of Java execution separately to test the effects of different configurations in both software and hardware. After that, an alternative Adaptive Optimization System (AOS) model is introduced, which estimated the cost/benefit using energy data instead of running time. We tuned the parameters of this model to study how to improve the dynamic compilation and optimization in Jikes RVM in terms of energy consumption. In order to further reduce the energy dissipation of JVM on embedded systems, we study adaptive drowsy cache control for Java applications, where JVM can be used to make better decision on drowsy cache control. We explore the impact of different phases of Java applications on the timing behavior of cache usage. Then we propose several techniques to adaptively control drowsy cache to reduce energy consumption with minimal impact on performance. It is observed that traditional Java code generation and instruction fetch path are not efficient. So we study three hardware-based code caching strategies, which attempt to write and read the dynamically generated Java code faster and more energy-efficiently. Time predictability is another key challenge for JVM on embedded systems. So we exploit multicore computing to reduce the timing unpredictability caused by dynamic compilation and adaptive optimization. Our goal is to retain high performance comparable to that of traditional dynamic compilation and, at the same time, obtain better time predictability for JVM. We study pre-compilation techniques to utilize another core more efficiently. Furthermore, we develop Pre-optimization on Another Core (PoAC) scheme to replace AOS in Jikes JVM, which is very sensitive to execution time variation and impacts time predictability greatly. Finally, we propose two new approaches that automatically parallelizes Java programs at run-time, in order to meet the performance challenge of JVM on embedded systems. These approaches rely on run-time trace information collected during program execution, and dynamically recompiles Java byte code that can be executed in parallel. One approach utilizes trace information to improve traditional loop parallelization, and the other parallelizes traces instead of loop iterations.
APA, Harvard, Vancouver, ISO, and other styles
9

Karlsson, Jan, and Patrik Eriksson. "How the choice of Operating System can affect databases on a Virtual Machine." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4848.

Full text
Abstract:
As databases grow in size, the need for optimizing databases is becoming a necessity. Choosing the right operating system to support your database becomes paramount to ensure that the database is fully utilized. Furthermore with the virtualization of operating systems becoming more commonplace, we find ourselves with more choices than we ever faced before. This paper demonstrates why the choice of operating system plays an integral part in deciding the right database for your system in a virtual environment. This paper contains an experiment which measured benchmark performance of a Database management system on various virtual operating systems. This experiment shows the effect a virtual operating system has on the database management system that runs upon it. These findings will help to promote future research into this area as well as provide a foundation on which future research can be based upon.
APA, Harvard, Vancouver, ISO, and other styles
10

Alabdulhafez, Abdulaziz. "Analysing and quantifying the influence of system parameters on virtual machine co-residency in public clouds." Thesis, University of Newcastle upon Tyne, 2015. http://hdl.handle.net/10443/2981.

Full text
Abstract:
Public Infrastructure-as-a-Service (IaaS) cloud promises significant efficiency to businesses and organisations. This efficiency is possible by allowing “co-residency” where Virtual Machines (VMs) that belong to multiple users share the same physical infrastructure. With co-residency being inevitable in public IaaS clouds, malicious users can leverage information leakage via side channels to launch several powerful attacks on honest co-resident VMs. Because co-residency is a necessary first step to launching side channel attacks, this motivates this thesis to look into understanding the co-residency probability (i.e. the probability that a given VM receives a co-resident VM). This thesis aims to analyse and quantify the influence of cloud parameters (such as the number of hosts and users) on the co-residency probability in four commonly used Placement Algorithms (PAs). These PAs are First Fit, Next Fit, Power Save and Random. This analysis then helps to identify the cloud parameters’ settings that reduce the coresidency probability in four PAs. Because there are many cloud parameters and parameters’ settings to consider, this forms the main challenge in this thesis. In order to overcome this challenge, fractional factorial design is used to reduce the number of required experiments to analyse and quantify the parameters’ influence in various settings. This thesis takes a quantitative experimental simulation and analytical prediction approach to achieve its aim. Using a purpose-built VM Co-residency simulator, (i) the most influential cloud parameters affecting co-residency probability in four PAs have been identified. Identifying the most influential parameters has helped to (ii) explore the best settings of these parameters that reduce the co-residency probability under the four PAs. Finally, analytical estimation, with the coexistence of different populations of attackers, has been derived to (iii) find the probability that a new co-residing VM belongs to an attacker. This thesis identifies the number of hosts to be the most influential cloud parameters on the coresidency probability in the four PAs. Also, this thesis presents evidence that VMs hosted in IaaS clouds that use Next Fit or Random are more resilient against receiving co-resident VMs compared to when First Fit or Power Save are used. Further, VMs in IaaS clouds with a higher number of hosts are less likely to exhibit co-residency. This thesis generates new insights into the potential of co-residency reduction to reduce the attack surface for side channel attacks. The outcome of this thesis is a plausible blueprint for IaaS cloud providers to consider the influence on the co-residency probability as an important selection factor for cloud settings and PAs.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "System call virtual machine"

1

Jain, L. C. Modeling machine emotions for realizing intelligence: Foundations and applications. Berlin: Springer-Verlag, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Corporation, International Business Machines, ed. IBM virtual machine - system product: CMS user's guide. 5th ed. Endicott, N.Y: IBM, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Microsoft System Center Virtual Machine Manager 2012 Cookbook. Packt Publishing, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Blokdyk, Gerardus. System Virtual Machine a Complete Guide - 2020 Edition. Emereo Pty Limited, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Corporation, International Business Machines, ed. Conversion guide and notebook for VM/XA SP and VM/ESA, release 2.2: Virtual machine/enterprise systems architecture. 5th ed. Endicott, NY (1701 North St., Endicott 13760-5553): International Business Machines Corp., 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Joseph, Lentin, and Ramkumar Gandhinathan. ROS Robotics Projects: Build and control robots powered by the Robot Operating System, machine learning, and virtual reality, 2nd Edition. Packt Publishing, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Recent Advances In Parallel Virtual Machine And Message Passing Interface 16th European Pvmmpi Users Group Meeting Helsinki Finland September 710 2009 Proceedings. Springer, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Coopersmith, Jennifer. D’Alembert’s Principle. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198743040.003.0005.

Full text
Abstract:
It is explained how the mysterious Principle of Virtual Work in statics is extended to the even more mysterious Principle of d’Alembert’s in dynamics. This is achieved by d’Alembert’s far-sighted stratagem: considering a reversed massy acceleration as an inertial force. A worked example is given (the half-Atwood machine or “black box”). Some counter-intuitive aspects are made intuitive by more examples: the Pluto-Charon system of orbiting planets; Newton’s and then Mach’s explanation of Newton’s bucket. Also, it is demonstrated that the law of the conservation of energy actually follows from d’Alembert’s Principle. The reader is alerted to the astoundingly fundamental nature of d’Alembert’s Principle. It is the cornerstone of classical, relativistic, and quantum mechanics. As Lanczos writes: “All the different principles of mechanics are merely mathematically different formulations of d’Alembert’s Principle”.
APA, Harvard, Vancouver, ISO, and other styles
9

Susskind, Richard. Online Courts and the Future of Justice. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198838364.001.0001.

Full text
Abstract:
In Online Courts and the Future of Justice, Richard Susskind, the world’s most cited author on the future of legal services, shows how litigation will be transformed by technology and proposes a solution to the global access-to-justice problem. In most advanced legal systems, the resolution of civil disputes takes too long, costs too much, and the process is not just antiquated; it is unintelligible to ordinary mortals. The courts of some jurisdictions are labouring under staggering backlogs - 100 million cases in Brazil, 30 million in India. More people in the world now have internet access than access to justice. Drawing on almost 40 years in the fields of legal technology and jurisprudence, Susskind shows how we can use the remarkable reach of the internet (more than half of humanity is now online) to help people understand and enforce their legal rights. Online courts provide 'online judging' - the determination of cases by human judges but not in physical courtrooms. Instead, evidence and arguments are submitted through online platforms through which judges also deliver their decisions. Online courts also use technology to enable courts to deliver more than judicial decisions. These 'extended courts' provide tools to help users understand relevant law and available options, and to formulate arguments and assemble evidence. They offer non-judicial settlements such as negotiation and early neutral evaluation, not as an alternative to the public court system but as part of it. A pioneer of online courts, Susskind maintains that they will displace much conventional litigation. He rigorously assesses the benefits and drawbacks, and looks ahead, predicting how AI, machine learning, and virtual reality will likely come to dominate court service.
APA, Harvard, Vancouver, ISO, and other styles
10

Newlands, Samuel. Reconceiving Spinoza. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198817260.001.0001.

Full text
Abstract:
In Reconceiving Spinoza, Newlands returns to Spinoza’s self-described foundational project and provides an integrated interpretation of his metaphysical system and the way in which his metaphysics shapes, and is shaped by, his moral program. One of the overarching theses of this book is that conceptual relations form the backbone of Spinoza’s explanatory project and perform a surprising amount of work in his metaphysics and ethics. Conceptual relations are the philosophical grease that keeps the Spinozistic machine running smoothly, allowing him to do everything from reconciling monism with diversity to providing non-prudential grounds for altruism within an ethical egoist framework. One of the author’s main goals is to exhibit how much work conceptual relations do for Spinoza and how much seeing this changes our understanding of his philosophical outlook. Furthermore, given Spinoza’s metaphysics of individuals, a moral agent’s interests and even self-identity can vary, relative to some of these different ways of being conceived. This will have the startling implication that Spinoza’s ethical egoism, when combined with his concept-sensitive metaphysics, is ultimately a call to a radical kind of self-transcendence. We will thus be challenged to reconceive not only the world, but also Spinoza’s project, and perhaps even ourselves, along the way.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "System call virtual machine"

1

Pfoh, Jonas, Christian Schneider, and Claudia Eckert. "Nitro: Hardware-Based System Call Tracing for Virtual Machines." In Advances in Information and Computer Security, 96–112. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25141-2_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Soni, Jayesh, Suresh K. Peddoju, Nagarajan Prabakar, and Himanshu Upadhyay. "Comparative Analysis of LSTM, One-Class SVM, and PCA to Monitor Real-Time Malware Threats Using System Call Sequences and Virtual Machine Introspection." In Lecture Notes in Electrical Engineering, 113–27. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-4909-4_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Posey, Brien. "Using System Center Virtual Machine Manager for Virtual Machine Migrations." In Hyper-V for VMware Administrators, 155–82. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0379-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sunderam, Vaidy. "From Parallel Virtual Machine to Virtual Parallel Machine: The Unibus System." In Recent Advances in Parallel Virtual Machine and Message Passing Interface, 11. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-87475-1_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gunther, Neil J. "Virtual Machine Analysis with PDQ." In Analyzing Computer System Performance with Perl::PDQ, 387–422. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22583-3_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wan, Mingjie, Xiaolong Chang, Yuhui Li, Zaochen Liu, and Shiyou Ma. "Application of Virtual Reality Technology in Man–Machine Interactive Equipment Virtual Maintenance System." In Man-Machine-Environment System Engineering, 875–79. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-6978-4_100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ludwig, Thomas, Roland Wismüller, and Michael Oberhuber. "OCM — An OMIS compliant monitoring system." In Parallel Virtual Machine — EuroPVM '96, 81–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/3540617795_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tagirova, K. F., I. I. Zinatullin, and A. M. Vulfin. "Intelligent Virtual Machine Resource Management System." In Lecture Notes in Electrical Engineering, 780–88. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71119-1_76.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sunderam, Vaidy. "The PVM system: Status, trends, and directions." In Parallel Virtual Machine — EuroPVM '96, 68–80. Berlin, Heidelberg: Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/3540617795_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bao, Zuohui, Yong Wang, Zuobin Yang, Chunfeng Zhu, and Cheng Jin. "Design on the Virtual Maintenance Training System of Some-Type Equipment Based on the Virtual Reality." In Man-Machine-Environment System Engineering, 479–87. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-2481-9_56.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "System call virtual machine"

1

Wu, Rui, Ping Chen, Peng Liu, and Bing Mao. "System Call Redirection: A Practical Approach to Meeting Real-World Virtual Machine Introspection Needs." In 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2014. http://dx.doi.org/10.1109/dsn.2014.59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dawson, Joel A., Jeffrey T. McDonald, Lee Hively, Todd R. Andel, Mark Yampolskiy, and Charles Hubbard. "Phase Space Detection of Virtual Machine Cyber Events Through Hypervisor-Level System Call Analysis." In 2018 1st International Conference on Data Intelligence and Security (ICDIS). IEEE, 2018. http://dx.doi.org/10.1109/icdis.2018.00034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Roussev, Boris. "Teaching Introduction to Programming as Part of the IS Component of the Business Curriculum." In 2003 Informing Science + IT Education Conference. Informing Science Institute, 2003. http://dx.doi.org/10.28945/2714.

Full text
Abstract:
Modern software practices call for the active involvement of business people in the software process. Therefore, programming has become an indispensable part of the IS component of the core curriculum at business schools. In this paper, we present a model-based approach to teaching introduction to programming to general business students. The underpinnings of the new approach are modeling, abstraction, and Bloom's classification of cognitive skills. We employ models to introduce the basic programming constructs and their semantics. To this end, we use statecharts to model object's state, the environment model of evaluation as a virtual machine interpreting the programs written in JavaScript, and UML class diagrams to represent the static structure of the designed software systems. The adoption of this approach helps learners build a sound mental model of the notion of computation process. Learners' achievements, student evaluations, and our subjective opinion suggest that the proposed ideas improve the course significantly.
APA, Harvard, Vancouver, ISO, and other styles
4

Onoue, Koichi, Yoshihiro Oyama, and Akinori Yonezawa. "Control of system calls from outside of virtual machines." In the 2008 ACM symposium. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1363686.1364196.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fursova, Natalia. "Introspection of the virtual machines with system calls monitoring." In SAC 2016: Symposium on Applied Computing. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2851613.2852008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Maiteh, Bilal. "An Application of Swept-Volume Computation In Machine Tool Probing." In ASME 2005 International Mechanical Engineering Congress and Exposition. ASMEDC, 2005. http://dx.doi.org/10.1115/imece2005-79293.

Full text
Abstract:
The machine tool probing can improve efficiency in many different ways, but it is underused in almost every manufacturing location. Part of the reason, probing is underused, is the complexity that often comes with adding probing to the process. Manufacturing companies generate milling and drilling tool paths with ease, using any of a variety of CAM systems. But probing calls for macros that are often either added to the NC code through manual editing, or else entered right at the CNC. This papers present a method to address this shortcoming. A method has been developed using a swept-volume computation to emulate the physical environment for probing process. The virtual probing trajectories are obtained from CAM software. In the mathematical algorithm, the swept volumes of the probing tools are computed from the probing tools’ geometric data and trajectories. Collision operations are then performed on the swept volumes of the virtual probing tools and the virtual machined workpiece to verify the probing process.
APA, Harvard, Vancouver, ISO, and other styles
7

Yen, Gary G., and Qiang Fu. "Automatic frog call monitoring system: a machine learning approach." In AeroSense 2002, edited by Kevin L. Priddy, Paul E. Keller, and Peter J. Angeline. SPIE, 2002. http://dx.doi.org/10.1117/12.458716.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Castagna, Giuseppe, Guillaume Duboc, Victor Lanvin, and Jeremy G. Siek. "A space-efficient call-by-value virtual machine for gradual set-theoretic types." In IFL '19: Implementation and Application of Functional Languages. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3412932.3412940.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Vicente, Elder, Rivalino Matias Jr., Autran Macedo, and Lucio B. Araujo. "Evaluation of Compound System Calls in the Linux Kernel on Physical and Virtual Machines." In 2011 12th International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT). IEEE, 2011. http://dx.doi.org/10.1109/pdcat.2011.39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Madsen, Magnus, Ramin Zarifi, and Ondřej Lhoták. "Tail call elimination and data representation for functional languages on the Java virtual machine." In CGO '18: 16th Annual IEEE/ACM International Symposium on Code Generation and Optimization. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3178372.3179499.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "System call virtual machine"

1

Robinson, Susan M., Antonio Roque, Ashish Vaswani, David Traum, Charles Hernandez, and Bill Millspaugh. Evaluation of a Spoken Dialogue System for Virtual Reality Call for Fire Training. Fort Belvoir, VA: Defense Technical Information Center, January 2007. http://dx.doi.org/10.21236/ada461549.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography