Virtual memory

Results: 756



#Item
211Java platform / Computing platforms / Memory management / Pointer / Java virtual machine / Java Native Interface / Dynamic random-access memory / Type safety / ECC memory / Computing / Computer memory / Cross-platform software

Using Memory Errors to Attack a Virtual Machine Sudhakar Govindavajhala ∗ Andrew W. Appel Princeton University {sudhakar,appel}@cs.princeton.edu Abstract

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2003-03-06 09:41:50
212Computing / Microcontrollers / Virtual memory / Instruction set architectures / Central processing unit / Memory management unit / CPU cache / Dynamic random-access memory / SuperH / Computer hardware / Computer architecture / Computer memory

Hitachi SuperH RISC engine SH7750 Series SH7750, SH7750S Hardware Manual

Add to Reading List

Source URL: www.boob.co.uk

Language: English - Date: 2001-05-18 07:14:44
213Central processing unit / Instruction set architectures / Virtual memory / Computer memory / Memory management unit / SuperH / CPU cache / Reduced instruction set computing / Addressing mode / Computer architecture / Computer hardware / Computing

SuperH™ (SH) 32-Bit RISC MCU/MPU Series SH7750 High-Performance RISC Engine Programming Manual

Add to Reading List

Source URL: www.boob.co.uk

Language: English - Date: 2001-02-14 21:50:32
214Virtual memory / Central processing unit / CPU cache / Mmap / Page table / Translation lookaside buffer / C dynamic memory allocation / Radix tree / Page / Memory management / Computing / Computer memory

RadixVM: Scalable address spaces for multithreaded applications Austin T. Clements, M. Frans Kaashoek, and Nickolai Zeldovich MIT CSAIL A BSTRACT

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-04-29 10:31:16
215X86 architecture / Memory protection / X86 memory segmentation / Virtual memory / Capability-based addressing / X86 / Intel iAPX 432 / Memory address / Ring / Computer architecture / Memory management / Computing

Memory Segmentation to Support Secure Applications Student: Jonathan Woodruff Supervisor: Simon W. Moore Project Lead: Robert N. M. Watson University of Cambridge, Computer Laboratory

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-04-30 09:46:42
216Crime prevention / Law enforcement / Legal professions / DOS memory management / Virtual Control Program Interface / Police / FBI National Academy / Gang Resistance Education and Training / National security / Security / Law

Newsletter of the Virginia Center for Policing Innovation UPDATE

Add to Reading List

Source URL: www.vcpionline.org

Language: English - Date: 2011-03-23 19:20:50
217Cognition / Memory / Abnormal psychology / Paranoia / Priming / Virtual reality / Cognitive science / Philosophy of mind / Mind / Psychosis / Media studies

Microsoft Word - Priming to induce paranoid thought in a non clinical population.docx

Add to Reading List

Source URL: ii.tudelft.nl

Language: English - Date: 2013-07-25 04:31:35
218National security / Crime prevention / Law enforcement / DOS memory management / Virtual Control Program Interface / United States Department of Justice / Sheriffs in the United States / Police / COPS / Law enforcement in the United States / Law / Government

Virginia Center for Policing Innovation “Nothing great in the world has been accomplished

Add to Reading List

Source URL: www.vcpionline.org

Language: English - Date: 2010-01-04 15:54:34
219Algorithm / Computer program / Automatic memory management / Computing / Memory management / Garbage collection

Memory Management Prototyper Designing and tuning a garbage collection algorithm and memory management in a virtual machine is a very time consuming task: next to verifying the correctness of the algorithms an important

Add to Reading List

Source URL: www.ssw.uni-linz.ac.at

Language: English - Date: 2011-12-16 07:25:54
220SCSI / C dynamic memory allocation / PBKDF2 / Computing / RAID / Computer architecture

Softraid: OpenBSD’s virtual HBA, with benefits Marco Peereboom OpenBSD The transformations are arbitrarily complex and span a wide range of uses. For example, a discipline could mirror an I/O, stripe an I/O or encrypt

Add to Reading List

Source URL: www.openbsd.org.my

Language: English - Date: 2010-05-17 03:46:35
UPDATE