|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 141 occurrences of 85 keywords
|
|
|
Results
Found 157 publication records. Showing 157 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
173 | Ruo Ando, Youki Kadobayashi, Yoichi Shinoda |
An Enhancement of Trusted Domain Enforcement using VMM Interruption Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2222-2229, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
134 | Stephen T. Jones, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau |
Geiger: monitoring the buffer cache in a virtual machine environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASPLOS ![In: Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2006, San Jose, CA, USA, October 21-25, 2006, pp. 14-24, 2006, ACM, 1-59593-451-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
virtual machine, inference |
119 | Paul A. Karger |
Securing virtual machine monitors: what is needed? ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 1, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
virtual machine monitors, hypervisors, security kernels |
108 | Kelly D. Larson |
Translation of an existing VMM-based SystemVerilog testbench to OVM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 45th Design Automation Conference, DAC 2008, Anaheim, CA, USA, June 8-13, 2008, pp. 237, 2008, ACM, 978-1-60558-115-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
OVM, VMM, testbenches, SystemVerilog |
89 | Keith Adams, Ole Agesen |
A comparison of software and hardware techniques for x86 virtualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASPLOS ![In: Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2006, San Jose, CA, USA, October 21-25, 2006, pp. 2-13, 2006, ACM, 1-59593-451-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
MMU, nested paging, SVM, virtualization, virtual machine monitor, dynamic binary translation, TLB, x86, VT |
83 | Megumi Ito, Shuichi Oikawa |
Lightweight Shadow Paging for Efficient Memory Isolation in Gandalf VMM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISORC ![In: 11th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2008), 5-7 May 2008, Orlando, Florida, USA, pp. 508-515, 2008, IEEE Computer Society, 978-0-7695-3132-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Virtual Machine Monitors, System Software |
83 | Ryan D. Riley, Xuxian Jiang, Dongyan Xu |
Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 1-20, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
79 | Min Xu, Xuxian Jiang, Ravi S. Sandhu, Xinwen Zhang |
Towards a VMM-based usage control framework for OS kernel integrity protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings, pp. 71-80, 2007, ACM, 978-1-59593-745-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
kernel integrity, operating system protection, access control, authorization, security architecture, usage control, VMM, UCON |
78 | Ruo Ando, Youki Kadobayashi, Yoichi Shinoda |
Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings, pp. 131-143, 2007, Springer, 978-3-540-76787-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Asynchronous snapshot, paravirtualized VMM, memory forensics, virtualized interruption, split kernel module |
75 | Diego Ongaro, Alan L. Cox, Scott Rixner |
Scheduling I/O in virtual machine monitors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VEE ![In: Proceedings of the 4th International Conference on Virtual Execution Environments, VEE 2008, Seattle, WA, USA, March 5-7, 2008, pp. 1-10, 2008, ACM, 978-1-59593-796-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
machine virtualization, network I/O, xen, scheduling policy, server consolidation |
75 | Joaquín Salas |
Visual Memory Maps for Mobile Robots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR ![In: 15th International Conference on Pattern Recognition, ICPR'00, Barcelona, Spain, September 3-8, 2000., pp. 4681-4684, 2000, IEEE Computer Society, 0-7695-0750-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
69 | Guangdeng Liao, Danhua Guo, Laxmi N. Bhuyan, Steve R. King |
Software techniques to improve virtualized I/O performance on multi-core systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANCS ![In: Proceedings of the 2008 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, ANCS 2008, San Jose, California, USA, November 6-7, 2008, pp. 161-170, 2008, ACM, 978-1-60558-346-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
10GE, VMM scheduler, virtualization, multi-core, Xen |
68 | Junghwan Rhee, Ryan D. Riley, Dongyan Xu, Xuxian Jiang |
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 74-81, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
68 | Stephen T. Jones, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau |
VMM-based hidden process detection and identification using Lycosid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VEE ![In: Proceedings of the 4th International Conference on Virtual Execution Environments, VEE 2008, Seattle, WA, USA, March 5-7, 2008, pp. 91-100, 2008, ACM, 978-1-59593-796-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, virtual machine, inference |
63 | H. Andrés Lagar-Cavilla, Niraj Tolia, Mahadev Satyanarayanan, Eyal de Lara |
VMM-independent graphics acceleration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VEE ![In: Proceedings of the 3rd International Conference on Virtual Execution Environments, VEE 2007, San Diego, California, USA, June 13-15, 2007, pp. 33-43, 2007, ACM, 978-1-59593-630-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
VMM-independence, virtualization, graphics, portability, hardware acceleration |
63 | Paul A. Karger, Mary Ellen Zurko, Douglas W. Bonin, Andrew H. Mason, Clifford E. Kahn |
A Retrospective on the VAX VMM Security Kernel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 17(11), pp. 1147-1165, 1991. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
VAX VMM, A1-level security requirements, standard interfaces, ULTRIX-32 operating systems, multiple concurrent virtual machines, controlled sharing, system management tools, DEC computers, supervisory programs, virtual machines, security of data, configuration management, virtual-machine monitor, isolation, security kernel, microcode, sensitive data |
60 | Kenichi Kourai, Shigeru Chiba |
A Fast Rejuvenation Technique for Server Consolidation with Virtual Machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: The 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007, 25-28 June 2007, Edinburgh, UK, Proceedings, pp. 245-255, 2007, IEEE Computer Society, 0-7695-2855-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
60 | Bernhard Jansen, HariGovind V. Ramasamy, Matthias Schunter, Axel Tanner |
Architecting Dependable and Secure Systems Using Virtualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WADS ![In: Architecting Dependable Systems V [the book is a result from the WADS 2007 and the Third Workshop on the Role of Software Architecture for Testing and Analysis], pp. 124-149, 2007, Springer, 978-3-540-85570-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
54 | Yan Wen, Jinjing Zhao, Huaimin Wang, Jiannong Cao 0001 |
Implicit Detection of Hidden Processes with a Feather-Weight Hardware-Assisted Virtual Machine Monitor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, pp. 361-375, 2008, Springer, 978-3-540-69971-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
stealth malware, hardware-assisted VMM, Virtual machine monitor |
53 | Bin Chen, Nong Xiao, Zhiping Cai, Zhiying Wang 0003 |
An Optimized COW Block Device Driver in VMM for Fast, On-Demand Software Deployment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC (2) ![In: 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), Shanghai, China, December 17-20, 2008, Volume II: Workshops, pp. 387-392, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
53 | Kurniadi Asrigo, Lionel Litty, David Lie |
Using VMM-based sensors to monitor honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VEE ![In: Proceedings of the 2nd International Conference on Virtual Execution Environments, VEE 2006, Ottawa, Ontario, Canada, June 14-16, 2006, pp. 13-23, 2006, ACM, 978-1-59593-332-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
honeypot monitoring, intrusion detection, IDS, virtual machine monitor |
47 | Vijayakumar Polepally, K. Shahu Chatrapati |
DEGSA-VMM: Dragonfly-based exponential gravitational search algorithm to VMM strategy for load balancing in cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Kybernetes ![In: Kybernetes 47(6), pp. 1138-1157, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
45 | Lei Ye 0008, Gen Lu, Sushanth Kumar, Chris Gniady, John H. Hartman |
Energy-efficient storage in virtual machine environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VEE ![In: Proceedings of the 6th International Conference on Virtual Execution Environments, VEE 2010, Pittsburgh, Pennsylvania, USA, March 17-19, 2010, pp. 75-84, 2010, ACM, 978-1-60558-910-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
virtual machine, storage system, energy management |
45 | Sandra Julieta Rueda, Hayawardh Vijayakumar, Trent Jaeger |
Analysis of virtual machine system policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, Stresa, Italy, June 3-5, 2009, Proceedings, pp. 227-236, 2009, ACM, 978-1-60558-537-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
xen security modules (xsm), virtual machines, selinux, policy analysis |
45 | Huacai Chen, Hai Jin 0001, Zhiyuan Shao, Ke Yu, Kun Tian |
ClientVisor: leverage COTS OS functionalities for power management in virtualized desktop environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VEE ![In: Proceedings of the 5th International Conference on Virtual Execution Environments, VEE 2009, Washington, DC, USA, March 11-13, 2009, pp. 131-140, 2009, ACM, 978-1-60558-375-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
client virtualization, virtual machine, power management |
45 | Jason Franklin, Mark Luk, Jonathan M. McCune, Arvind Seshadri, Adrian Perrig, Leendert van Doorn |
Towards Sound Detection of Virtual Machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Botnet Detection ![In: Botnet Detection: Countering the Largest Security Threat, pp. 89-116, 2008, Springer, 978-0-387-68768-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Manabu Hirano, Takahiro Shinagawa, Hideki Eiraku, Shoichi Hasegawa, Kazumasa Omote, Kouichi Tanimoto, Takashi Horie, Kazuhiko Kato, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi |
Introducing Role-Based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 1225-1230, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Qiang Li, Qinfen Hao, Limin Xiao, Zhoujun Li |
VM-based Architecture for Network Monitoring and Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 1395-1400, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Megumi Ito, Shuichi Oikawa |
Improving Real-Time Performance of a Virtual Machine Monitor Based System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEUS ![In: Software Technologies for Embedded and Ubiquitous Systems, 6th IFIP WG 10.2 International Workshop, SEUS 2008, Anacarpi, Capri Island, Italy, October 1-3, 2008, Proceedings, pp. 114-125, 2008, Springer, 978-3-540-87784-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Deqing Zou, Yunfa Li 0001, Song Wu 0001, Weizhong Qiang |
A Trusted Group Signature Architecture in Virtual Computing Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings, pp. 73-85, 2008, Springer, 978-3-540-69294-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Nathan E. Rosenblum, Gregory Cooksey, Barton P. Miller |
Virtual machine-provided context sensitive page mappings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VEE ![In: Proceedings of the 4th International Conference on Virtual Execution Environments, VEE 2008, Seattle, WA, USA, March 5-7, 2008, pp. 81-90, 2008, ACM, 978-1-59593-796-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
context sensitive memory, self checksumming code, virtual machine monitor, xen |
45 | Shuichi Oikawa, Megumi Ito, Tatsuo Nakajima |
Linux/RTOS Hybrid Operating Environment on Gandalf Virtual Machine Monitor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC ![In: Embedded and Ubiquitous Computing, International Conference, EUC 2006, Seoul, Korea, August 1-4, 2006, Proceedings, pp. 287-296, 2006, Springer, 3-540-36679-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
45 | Amr Awadallah, Mendel Rosenblum |
The vMatrix: Server Switching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FTDCS ![In: 10th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2004), 26-28 May 2004, Suzhou, China, pp. 110-118, 2004, IEEE Computer Society, 0-7695-2118-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
server multiplexing, server switching, load balancing, virtual machine monitor |
45 | Julio Leao da Silva Jr., Francky Catthoor, Diederik Verkest, Hugo De Man |
Power exploration for dynamic data types through virtual memory management refinement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISLPED ![In: Proceedings of the 1998 International Symposium on Low Power Electronics and Design, 1998, Monterey, California, USA, August 10-12, 1998, pp. 311-316, 1998, ACM, 1-58113-059-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
39 | Xiantao Zhang, Qi Li 0002, Sihan Qing, Huanguo Zhang |
VNIDA: Building an IDS Architecture Using VMM-Based Non-Intrusive Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Proceedings of the International Workshop on Knowledge Discovery and Data Mining, WKDD 2008, Adelaide, Australia, 23-24 January 2008, pp. 594-600, 2008, IEEE Computer Society, 0-7695-3090-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Sanjay Kumar, Karsten Schwan |
Netchannel: a VMM-level mechanism for continuous, transparentdevice access during VM migration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VEE ![In: Proceedings of the 4th International Conference on Virtual Execution Environments, VEE 2008, Seattle, WA, USA, March 5-7, 2008, pp. 31-40, 2008, ACM, 978-1-59593-796-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
live VM migration, virtualization, I/O devices |
39 | Xuxian Jiang, Xinyuan Wang 0005, Dongyan Xu |
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 128-138, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
virtual machines, malware detection, rootkits |
30 | Dan E. Tamir, Natan T. Shaked, Wilhelmus J. Geerts, Shlomi Dolev |
Combinatorial Optimization Using Electro-Optical Vector by Matrix Multiplication Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OSC ![In: Optical SuperComputing, Second International Workshop, OSC 2009, Bertinoro, Italy, November 18-20, 2009. Proceedings, pp. 130-143, 2009, Springer, 978-3-642-10441-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
The Traveling Salesman Problem, Genetic Algorithms, Parallel Processing, Combinatorial Optimization, Heuristic Search, Hill Climbing, Optical Computing |
30 | Hiroaki Inoue, Junji Sakai, Masato Edahiro |
Processor virtualization for secure mobile terminals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Design Autom. Electr. Syst. ![In: ACM Trans. Design Autom. Electr. Syst. 13(3), pp. 48:1-48:23, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
processor virtualization, Multiprocessor |
30 | Paul A. Karger, David Safford |
I/O for Virtual Machine Monitors: Security and Performance Issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 6(5), pp. 16-23, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Koichi Onoue, Yoshihiro Oyama, Akinori Yonezawa |
Control of system calls from outside of virtual machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, pp. 2116-1221, 2008, ACM, 978-1-59593-753-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, virtual machine monitors, sandboxing, system call interception |
30 | Chuliang Weng, Yuan Luo 0003, Minglu Li 0001, Xinda Lu |
A BLP-Based Access Control Mechanism for the Virtual Machine System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2278-2282, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Lyndon S. Kennedy, Shih-Fu Chang |
Internet image archaeology: automatically tracing the manipulation history of photographs on the web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 16th International Conference on Multimedia 2008, Vancouver, British Columbia, Canada, October 26-31, 2008, pp. 349-358, 2008, ACM, 978-1-60558-303-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
image manipulation history, internet image mining, perspective discovery |
30 | Xiantao Zhang, Anthony X. F. Xu, Qi Li 0002, David K. Y. Yau, Sihan Qing, Huanguo Zhang |
A hash-TLB approach for MMU virtualization in xen/IA64. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 22nd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2008, Miami, Florida USA, April 14-18, 2008, pp. 1-8, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Akihiro Nakao, Ryota Ozaki, Yuji Nishida |
CoreLab: an emerging network testbed employing hosted virtual machine monitor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoNEXT ![In: Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, CoNEXT 2008, Madrid, Spain, December 9-12, 2008, pp. 73, 2008, ACM, 978-1-60558-210-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
hosted virtual machine monitor, virtual machine, virtualization, implementation, network testbed |
30 | See-hwan Yoo, Yunxin Liu, Cheol-Ho Hong, Chuck Yoo, Yongguang Zhang |
MobiVMM: a virtual machine monitor for mobile phones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiVirt ![In: Proceedings of the First Workshop on Virtualization in Mobile Computing, Breckenridge, CO, USA, June 17, 2008, pp. 1-5, 2008, ACM, 978-1-60558-328-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
mobile device, virtual machine monitor, embedded operating systems |
30 | Haibo Chen 0001, Rong Chen 0001, Fengzhe Zhang, Binyu Zang, Pen-Chung Yew |
Mercury: Combining Performance with Dependability Using Self-virtualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP ![In: 2007 International Conference on Parallel Processing (ICPP 2007), September 10-14, 2007, Xi-An, China, pp. 9, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Alexander Ufimtsev, Alena Kucharenka, Liam Murphy 0001 |
Impact of Virtual Memory Managers on Performance of J2EE Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CBSE ![In: Component-Based Software Engineering, 9th International Symposium, CBSE 2006, Västerås, Sweden, June 29 - July 1, 2006, Proceedings, pp. 285-293, 2006, Springer, 3-540-35628-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Wei Huang 0003, Jiuxing Liu, Bülent Abali, Dhabaleswar K. Panda 0001 |
A case for high performance computing with virtual machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICS ![In: Proceedings of the 20th Annual International Conference on Supercomputing, ICS 2006, Cairns, Queensland, Australia, June 28 - July 01, 2006, pp. 125-134, 2006, ACM, 1-59593-282-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Youhui Zhang, Yu Gu 0005, Hongyi Wang, Dongsheng Wang 0002 |
Virtual-Machine-based Intrusion Detection on File-aware Block Level Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SBAC-PAD ![In: 18th Symposium on Computer Architecture and High Performance Computing (SBAC-PAD 2006), 17-20 October 2006, Ouro Preto, Minas Gerais, Brazil, pp. 185-192, 2006, IEEE Computer Society, 0-7695-2704-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Ninad Ghodke, Renato J. O. Figueiredo |
On the implications of machine virtualization for DRM and fair use: a case study of a virtual audio device driver. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004, pp. 91-98, 2004, ACM, 1-58113-969-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
virtual machines, digital rights management, virtual devices |
25 | Akihiro Suzuki, Shuichi Oikawa |
Implementation of Virtual Machine Monitor for ARM Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010, pp. 2244-2249, 2010, IEEE Computer Society, 978-0-7695-4108-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
ARM architecture, VMM |
25 | Manabu Hirano, Takahiro Shinagawa, Hideki Eiraku, Shoichi Hasegawa, Kazumasa Omote, Kouichi Tanimoto, Takashi Horie, Seiji Mune, Kazuhiko Kato, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi |
A Two-Step Execution Mechanism for Thin Secure Hypervisors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 129-135, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
TCB, ID management, Security, Virtual machine monitor, Hypervisor, Trusted Computing Base, VMM |
25 | Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis, Pratap Subrahmanyam, Carl A. Waldspurger, Dan Boneh, Jeffrey S. Dwoskin, Dan R. K. Ports |
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASPLOS ![In: Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2008, Seattle, WA, USA, March 1-5, 2008, pp. 2-13, 2008, ACM, 978-1-59593-958-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
cloaking, multi-shadowing, operating systems, virtual machine monitors, hypervisors, memory protection, VMM |
25 | Joachim von Buttlar, Wilhelm G. Spruth |
Forschungs- und Entwicklungsprojekte: Virtuelle Maschinen: zSeries- und S/390-Partitionierung. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inform. Forsch. Entwickl. ![In: Inform. Forsch. Entwickl. 19(1), pp. 41-54, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Intelligent Resource Director, IRD, Interpretive Execution Facility, LPAR, LIC, OS/390, Parallel Sysplex, Partitionierung, PR/SM, Shadow Page Table, S/390, SIE, Start Interpretive Execution, zSeries, z/OS, z/VM, Virtual Machine, Hypervisor, VMM |
25 | Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh |
Terra: a virtual machine-based platform for trusted computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSP ![In: Proceedings of the 19th ACM Symposium on Operating Systems Principles 2003, SOSP 2003, Bolton Landing, NY, USA, October 19-22, 2003, pp. 193-206, 2003, ACM, 1-58113-757-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
authentication, virtual machine, trusted computing, virtual machine monitor, attestation, VMM |
24 | Wei Huang 0003, Matthew J. Koop, Qi Gao 0004, Dhabaleswar K. Panda 0001 |
Virtual machine aware communication libraries for high performance computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SC ![In: Proceedings of the ACM/IEEE Conference on High Performance Networking and Computing, SC 2007, November 10-16, 2007, Reno, Nevada, USA, pp. 9, 2007, ACM Press, 978-1-59593-764-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
VMM-bypass, inter-VM communication, virtual machines (VM), MPI, Xen |
24 | Florian Freye, Jie Lou, Christian Lanius, Tobias Gemmeke |
Merits of Time-Domain Computing for VMM - A Quantitative Comparison. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.18367, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
24 | Mouna Malki, Karima Chatouh |
Linear Codes over ℜs, m=∑ς=1m vmς-1m-1, with vmm=vm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2304.06532, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Zane Weissman, Thore Tiemann, Thomas Eisenbarth 0001, Berk Sunar |
Microarchitectural Security of AWS Firecracker VMM for Serverless Cloud Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2311.15999, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Ricard Lado-Roigé, Marco A. Pérez |
STB-VMM: Swin Transformer Based Video Motion Magnification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2302.10001, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Ricard Lado-Roigé, Marco A. Pérez |
STB-VMM: Swin Transformer based Video Motion Magnification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Knowl. Based Syst. ![In: Knowl. Based Syst. 269, pp. 110493, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Keisuke Takano, Takeaki Yajima, Satoshi Kawakami |
Design of The Ultra-Low-Power Driven VMM Configurations for μW Scale IoT Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MCSoC ![In: 16th IEEE International Symposium on Embedded Multicore/Many-core Systems-on-Chip, MCSoC 2023, Singapore, December 18-21, 2023, pp. 65-72, 2023, IEEE, 979-8-3503-9361-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Aditya Nautiyal, Shubhangi Saklani, Aditi Pant, Yutika Agarwal, Avantika Gaur, Preeti Mishra |
VNSecure: An explainable virtual network attack detection framework at VMM-Layer in virtualization environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IC3 ![In: Proceedings of the 2023 Fifteenth International Conference on Contemporary Computing, IC3-2023, Noida, India, August 3-5, 2023, pp. 153-160, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Everton de Matos, Markku Ahvenjärvi |
seL4 Microkernel for virtualization use-cases: Potential directions towards a standard VMM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2210.04328, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Rana Walied Ahmad, Dirk J. Wouters, Christopher Bengel, Rainer Waser, Stephan Menzel |
Analysis of VMM Operations on 1S1R Crossbar Arrays and the Influence of Wire Resistances. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: IEEE International Symposium on Circuits and Systems, ISCAS 2022, Austin, TX, USA, May 27 - June 1, 2022, pp. 91-95, 2022, IEEE, 978-1-6654-8485-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Tony Liu 0005, Amirali Amirsoleimani, Fabien Alibart, Serge Ecoffey, Dominique Drouin, Roman Genov |
AIDX: Adaptive Inference Scheme to Mitigate State-Drift in Memristive VMM Accelerators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. II Express Briefs ![In: IEEE Trans. Circuits Syst. II Express Briefs 68(4), pp. 1128-1132, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Chen Nie, Jie Lin, Huan Hu, Li Jiang 0002, Xiaoyao Liang, Zhezhi He |
Energy-Efficient Hybrid-RAM with Hybrid Bit-Serial based VMM Support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Great Lakes Symposium on VLSI ![In: GLSVLSI '21: Great Lakes Symposium on VLSI 2021, Virtual Event, USA, June 22-25, 2021., pp. 347-352, 2021, ACM, 978-1-4503-8393-6. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Bing Zhu 0006, Xiaowen Tao, Jian Zhao 0007, Min Ke, Huaji Wang, Weiwen Deng |
An Integrated GNSS/UWB/DR/VMM Positioning Strategy for Intelligent Vehicles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Veh. Technol. ![In: IEEE Trans. Veh. Technol. 69(10), pp. 10842-10853, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Tony Liu 0005, Amirali Amirsoleimani, Fabien Alibart, Serge Ecoffey, Dominique Drouin, Roman Genov |
AIDX: Adaptive Inference Scheme to Mitigate State-Drift in Memristive VMM Accelerators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2009.00180, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
24 | Sandeep Kaur Kingra, Vivek Parmar, Shubham Negi, Sufyan Khan, Boris Hudec, Tuo-Hung Hou, Manan Suri |
Methodology for Realizing VMM with Binary RRAM Arrays: Experimental Demonstration of Binarized-ADALINE Using OxRAM Crossbar. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2006.05657, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
24 | Sandeep Kaur Kingra, Vivek Parmar, Shubham Negi, Sufyan Khan, Boris Hudec, Tuo-Hung Hou, Manan Suri |
Methodology for Realizing VMM with Binary RRAM Arrays: Experimental Demonstration of Binarized-ADALINE using OxRAM Crossbar. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: IEEE International Symposium on Circuits and Systems, ISCAS 2020, Sevilla, Spain, October 10-21, 2020, pp. 1-5, 2020, IEEE, 978-1-7281-3320-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Matheus Torquato 0001, Paulo R. M. Maciel, Marco Vieira |
A Model for Availability and Security Risk Evaluation for Systems With VMM Rejuvenation Enabled by VM Migration Scheduling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 7, pp. 138315-138326, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Marco Spaziani Brunella, Giuseppe Bianchi 0001, Sara Turco, Francesco Quaglia, Nicola Blefari-Melazzi |
Foreshadow-VMM: Feasibility and Network Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NetSoft ![In: 5th IEEE Conference on Network Softwarization, NetSoft 2019, Paris, France, June 24-28, 2019, pp. 257-259, 2019, IEEE, 978-1-5386-9376-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Xiantao Zhang, Xiao Zheng, Zhi Wang 0004, Qi Li 0002, Junkang Fu, Yang Zhang, Yibin Shen |
Fast and Scalable VMM Live Upgrade in Large Cloud Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASPLOS ![In: Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2019, Providence, RI, USA, April 13-17, 2019, pp. 93-105, 2019, ACM, 978-1-4503-6240-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Umar Syed |
Inmate OS and VMM based Secured Virtualization for Cloud Encompassment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Web Appl. ![In: Int. J. Web Appl. 10(1), pp. 1-7, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
24 | Matheus Torquato 0001, I. M. Umesh, Paulo R. M. Maciel |
Models for availability and power consumption evaluation of a private cloud with VMM rejuvenation enabled by VM Live Migration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 74(9), pp. 4817-4841, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Chao Yang 0012, Yunfei Guo, Hongchao Hu, Wenyan Liu 0005 |
CacheSCDefender: VMM-based Comprehensive Framework against Cache-based Side-channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSII Trans. Internet Inf. Syst. ![In: KSII Trans. Internet Inf. Syst. 12(12), pp. 6098-6122, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Ajay Kumara M. A., Jaidhar C. D. |
Automated multi-level malware detection system based on reconstructed semantic view of executables using machine learning techniques at VMM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 79, pp. 431-446, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Jennifer Hasler, Sahil Shah |
VMM + WTA Embedded Classifiers Learning Algorithm Implementable on SoC FPAA Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Emerg. Sel. Topics Circuits Syst. ![In: IEEE J. Emerg. Sel. Topics Circuits Syst. 8(1), pp. 65-76, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Sahil Shah, Jennifer Hasler |
SoC FPAA Hardware Implementation of a VMM+WTA Embedded Learning Classifier. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Emerg. Sel. Topics Circuits Syst. ![In: IEEE J. Emerg. Sel. Topics Circuits Syst. 8(1), pp. 28-37, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | P. Gkountoumis |
Prototype board development for the validation of the VMM ASICs for the new small wheel ATLAS upgrade project. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MOCAST ![In: 7th International Conference on Modern Circuits and Systems Technologies, MOCAST 2018, Thessaloniki, Greece, May 7-9, 2018, pp. 1-4, 2018, IEEE, 978-1-5386-4788-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Jianbao Ren, Yong Qi, Yue-hua Dai, Xuan Yu, Yi Shi |
Nosv: A lightweight nested-virtualization VMM for hosting high performance computing on cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Softw. ![In: J. Syst. Softw. 124, pp. 137-152, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Liang Deng, Peng Liu 0005, Jun Xu 0024, Ping Chen 0003, Qingkai Zeng 0002 |
Dancing with Wolves: Towards Practical Event-driven VMM Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VEE ![In: Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, VEE 2017, Xi'an, China, April 8-9, 2017, pp. 83-96, 2017, ACM, 978-1-4503-4948-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Ady Wahyudi Paundu, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi |
Sequence-Based Analysis of Static Probe Instrumentation Data for a VMM-Based Anomaly Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCloud ![In: 3rd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2016, Beijing, China, June 25-27, 2016, pp. 84-94, 2016, IEEE Computer Society, 978-1-5090-0946-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Jiannan Ouyang, John R. Lange, Haoqiang Zheng |
Shoot4U: Using VMM Assists to Optimize TLB Operations on Preempted vCPUs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VEE ![In: Proceedings of the 12th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, Atlanta, GA, USA, April 2-3, 2016, pp. 17-23, 2016, ACM, 978-1-4503-3947-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Yu Zhang 0086, Jiange Zhang, Qiliang Zhang |
Making User-Level VMM for Deterministic Parallelism Nonblocking and Efficient. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: 17th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2016, Guangzhou, China, December 16-18, 2016, pp. 145-150, 2016, IEEE Computer Society, 978-1-5090-5081-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Kenichi Kourai, Takeshi Azumi, Shigeru Chiba |
Efficient and Fine-Grained VMM-Level Packet Filtering for Self-Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Adapt. Resilient Auton. Syst. ![In: Int. J. Adapt. Resilient Auton. Syst. 5(2), pp. 83-100, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
24 | Hiroshi Yamada, Kenji Kono |
A VMM-Level Approach to Shortening Downtime of Operating Systems Reboots in Software Updates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Inf. Syst. ![In: IEICE Trans. Inf. Syst. 97-D(10), pp. 2663-2675, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
24 | Bohar Singh, Pawan Luthra |
Review of Linpack and Cloudsim on VMM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1405.6490, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
24 | Lei Xia, Zheng Cui, John R. Lange, Yuan Tang, Peter A. Dinda, Patrick G. Bridges |
Fast VMM-based overlay networking for bridging the cloud and high performance computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Clust. Comput. ![In: Clust. Comput. 17(1), pp. 39-59, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
24 | Kyle C. Hale, Peter A. Dinda |
Guarded Modules: Adaptively Extending the VMM's Privilege Into the Guest. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAC ![In: 11th International Conference on Autonomic Computing, ICAC '14, Philadelphia, PA, USA, June 18-20, 2014., pp. 85-96, 2014, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
24 | Maciej Swiech, Kyle C. Hale, Peter A. Dinda |
VMM emulation of Intel hardware transactional memory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ROSS@ICS ![In: Proceedings of the 4th International Workshop on Runtime and Operating Systems for Supercomputers, ROSS 2014, Munich, Germany, June 10, 2014, pp. 4:1-4:8, 2014, ACM, 978-1-4503-2950-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
24 | Hai Jin 0001, Guofu Xiang, Deqing Zou, Song Wu 0001, Feng Zhao 0003, Min Li, Weide Zheng |
A VMM-based intrusion prevention system in cloud computing environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 66(3), pp. 1133-1151, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Mohsen Sharifi, Hadi Salimi, Alireza Saberi, Joobin Gharibshah |
VMM detection using privilege rings and benchmark execution times. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Networks Distributed Syst. ![In: Int. J. Commun. Networks Distributed Syst. 11(3), pp. 310-326, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Xuan Yu, Qi Yong, Yue-hua Dai, Jianbao Ren, Xiaoguang Wang 0003, Shi Yi |
A Low Overhead and Reliable Nested Virtualization VMM for Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE WISA ![In: 2013 10th Web Information System and Application Conference, Yangzhou, China, November 10-15, 2013, pp. 400-405, 2013, IEEE Computer Society, 978-1-4799-3218-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Shubha Ramakrishnan, Jennifer Hasler |
A compact programmable analog classifier using a VMM + WTA network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICASSP ![In: IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2013, Vancouver, BC, Canada, May 26-31, 2013, pp. 2538-2542, 2013, IEEE. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Xiaoguang Wang 0003, Yong Qi, Yue-hua Dai, Jianbao Ren |
Transparent Security-Sensitive Process Protection via VMM-Based Process Shadowing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC Workshops ![In: IEEE 37th Annual Computer Software and Applications Conference, COMPSAC Workshops 2013, Kyoto, Japan, July 22-26, 2013, pp. 115-120, 2013, IEEE Computer Society, 978-1-4799-2159-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Hao Zheng 0004, Endong Wang, Yinfeng Wang, Xingjun Zhang, Baoke Chen, Weiguo Wu, Xiaoshe Dong |
Transparent driver-kernel isolation with VMM intervention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRIOS@SOSP ![In: Proceedings of the First ACM SIGOPS Conference on Timely Results in Operating Systems, TRIOS@SOSP 2013, Farmington, PA, USA, November 3, 2013, pp. 2:1-2:16, 2013, ACM, 978-1-4503-2463-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Xiaofei Huang, Xiaoying Bai, Richard M. Lee |
An Empirical Study of VMM Overhead, Configuration Performance and Scalability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSE ![In: Seventh IEEE International Symposium on Service-Oriented System Engineering, SOSE 2013, San Francisco, CA, USA, March 25-28, 2013, pp. 359-366, 2013, IEEE Computer Society, 978-1-4673-5659-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 157 (100 per page; Change: ) Pages: [ 1][ 2][ >>] |
|