• Documents
  • Authors
  • Tables

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 4,829
Next 10 →

Table 8: Method interposition overhead

in Tailoring Java for a Pervasive Service Infrastructure
by Philippe Bernadat, Ira Greenberg, Ira Greenberg, Alan Messer, Alan Messer, Dejan Milojicic, Dejan Milojicic 2002
Cited by 1

Table 1: Different methods of extending operating system functionality and examples.

in Extending the Operating System at the User Level: the Ufo Global File System
by Albert Alexandrov Maximilian, Ian E. Schauser, Chris J. Scheima, Albert D. Alex, Albert D. Alex, Maximilian Ibel, Maximilian Ibel, Klaus E. Schauser, Chris J. Scheiman
"... In PAGE 5: ... This mechanism, which first was used in the context of Mach to implement interposition agents [Jon93], forms the basis for our Ufo implementation. Table1 lists examples of the above approaches, while Table 2 summarizes their limitations and identifies the context in which they can be applied. We wanted an approach which works with most existing applications without the need for recompiling, and more importantly, which can be used without requiring root access.... ..."

Table 1: Different methods of extending operating system functionality and examples.

in Extending the Operating System at the User Level: the Ufo Global File System
by Albert Alexandrov Maximilian, Albert D. Alex, Maximilian Ibel, Klaus E. Schauser, Chris J. Scheiman
"... In PAGE 4: ... This mechanism, which first was used in the context of Mach to implement interposition agents [Jon93], forms the basis for our Ufo implementation. Table1 lists examples of the above approaches, while Table 2 summarizes their limitations and identifies the context in which they can be applied. We wanted an approach which works with most existing applications without the need for recompiling, and more importantly, which can be used without requiring root access.... ..."

Table 1: Different methods of extending operating system functionality and examples.

in Extending the Operating System at the User Level: the Ufo Global File System
by Albert D. Alexandrov, Maximilian Ibel, Klaus E. Schauser, Chris J. Scheiman
"... In PAGE 4: ... This mechanism, which first was used in the context of Mach to implement interposition agents [Jon93], forms the basis for our Ufo implementation. Table1 lists examples of the above approaches, while Table 2 summarizes their limitations and identifies the context in which they can be applied. We wanted an approach which works with most existing applications without the need for recompiling, and more importantly, which can be used without requiring root access.... ..."

Table 1: Different methods of extending operating system functionality and examples.

in Extending the Operating System at the User Level: the Ufo Global File System
by Albert Alexandrov, Maximilian Ibel, Klaus E. Schauser, Chris J. Scheiman
"... In PAGE 4: ... This mechanism, which first was used in the context of Mach to implement interposition agents [Jon93], forms the basis for our Ufo implementation. Table1 lists examples of the above approaches, while Table 2 summarizes their limitations and identifies the context in which they can be applied. We wanted an approach which works with most existing applications without the need for recompiling, and more importantly, which can be used without requiring root access.... ..."

Table 1: Impact of interposition on program execution

in DITools: Application-level Support for Dynamic Extension and Flexible Composition
by Albert Serra, Nacho Navarro, Toni Cortes 2000
"... In PAGE 7: ...ng System, release 6.5.3. In programs enhanced by our infrastructure we ex- pect to observe two e ects on performance: an in- crease in startup time due to extra processing, and some overhead during execution due to the addi- tional indirection. Results summarized in Table1 come from the aver- age of 4 executions of each benchmark, running on a dedicated processor of the machine, to minimize the e ects of cold start and interferences from other processes. This table shows, for each program, the number of statically available dynamically{linked references (static hooks), how many times these hooks are triggered at runtime (dynamic activation count), the elapsed time for the unmodi ed execu- tion environment (baseline), and the elapsed time when invoking the empty wrapper at every call.... In PAGE 7: ... This table shows, for each module, its static size in disk as well as the size of all the virtual memory regions required to hold its code and data within the process address space at run{time. The `count apos; extension has been used to compute the columns la- beled `hook counts apos; in Table1 , the `forward apos; exten- sion corresponds to the `forward apos; experiment, and the `monitoring apos; extension to the `monitoring apos; ex-... ..."
Cited by 18

Table 1: Impact of interposition on program execution

in DITools: Application-level Support for Dynamic Extension and Flexible Composition
by Albert Serra, Nacho Navarro, Toni Cortes, Departament D'arquitectura De Computadors 2000
"... In PAGE 8: ...ng System, release 6.5.3. In programs enhanced by our infrastructure we ex- pect to observetwo e ects on performance: an in- crease in startup time due to extra processing, and some overhead during execution due to the addi- tional indirection. Results summarized in Table1 come from the aver- age of 4 executions of each benchmark, running on a dedicated processor of the machine, to minimize the e ects of cold start and interferences from other processes. This table shows, for each program, the number of statically available dynamically{linked references (static hooks), how many times these hooks are triggered at runtime (dynamic activation count), the elapsed time for the unmodi ed execu- tion environment (baseline), and the elapsed time when invoking the empty wrapper at every call.... In PAGE 8: ... This table shows, for each module, its static size in disk as well as the size of all the virtual memory regions required to hold its code and data within the process address space at run{time. The `count apos; extension has been used to compute the columns la- beled `hook counts apos;in Table1 , the `forward apos; exten- sion corresponds to the `forward apos; experiment, and the `monitoring apos; extension to the `monitoring apos; ex-... ..."
Cited by 18

Table 1: Impact of interposition on program execution

in DITools: Application--level Support for Dynamic Extension
by And Flexible Composition, Albert Serra, Nacho Navarro, Toni Cortes 2000
"... In PAGE 7: ...ng System, release 6.5.3. In programs enhanced by our infrastructure we ex- pect to observe two e ects on performance: an in- crease in startup time due to extra processing, and some overhead during execution due to the addi- tional indirection. Results summarized in Table1 come from the aver- age of 4 executions of each benchmark, running on a dedicated processor of the machine, to minimize the e ects of cold start and interferences from other processes. This table shows, for each program, the number of statically available dynamically{linked references (static hooks), how many times these hooks are triggered at runtime (dynamic activation count), the elapsed time for the unmodi ed execu- tion environment (baseline), and the elapsed time when invoking the empty wrapper at every call.... In PAGE 7: ... This table shows, for each module, its static size in disk as well as the size of all the virtual memory regions required to hold its code and data within the process address space at run{time. The `count apos; extension has been used to compute the columns la- beled `hook counts apos; in Table1 , the `forward apos; exten- sion corresponds to the `forward apos; experiment, and the `monitoring apos; extension to the `monitoring apos; ex-... ..."
Cited by 18

Table 8: Tentative optimizations 4.2.3 Impact of the interposition mechanism The last series of measurements evaluates the impact of the system call interposition mechanism on system performance. We compare std with the following kernel con guration: t: same as std, plus interposition support. GAEDE results are given in Fig. 3: std and t show equivalent performance. KBENCH results are given in Tab. 9. This table gives the cost of the threadSelf CHORUS system call. In comparison with std, t executes 7 additional instructions, and the corresponding micro-second overhead is 0.5%.

in Micro-Kernel Support For Trace-Replay
by Cs Tr-

Table 4. The example policies that were created and tested with the runtime monitoring solution. Extension Function Stock File Lookup Overhead Interposition Overhead (ms) (ms) (%) (ms) (%)

in Extensible Web Browser Security
by Mike Ter Louw, Jin Soon Lim, V. N. Venkatakrishnan
Next 10 →
Results 1 - 10 of 4,829
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University