PPT Slide
1. Condor Shadow and Remote System Calls
2. Operation of the Process Hijacker
3. How the Hijacker changes system calls to RPCs
4. How a hijacked process is checkpointed
5. Status, limitations, and summary
The Rest of My Talk
Previous slide
Next slide
Back to first slide
View graphic version