| 2008 | A method specialisation and virtualised execution environment for Java. Andrew M. Cheadle, A. J. Field, Johan Nyström-Persson |
| 2008 | A principled approach to nondeferred reference-counting garbage collection. Pramod G. Joisha |
| 2008 | Applications of a feather-weight virtual machine. Yang Yu, Hariharan Kolam, Lap-Chung Lam, Tzi-cker Chiueh |
| 2008 | Cell GC: using the cell synergistic processor as a garbage collection coprocessor. Chen-Yong Cher, Michael Gschwind |
| 2008 | Characterization & analysis of a server consolidation benchmark. Padma Apparao, Ravi R. Iyer, Xiaomin Zhang, Donald Newell, Tom Adelmeyer |
| 2008 | Execution replay of multiprocessor virtual machines. George W. Dunlap, Dominic G. Lucchetti, Michael A. Fetterman, Peter M. Chen |
| 2008 | Improving Xen security through disaggregation. Derek Gordon Murray, Grzegorz Milos, Steven Hand |
| 2008 | Inter-domain socket communications supporting high performance and full binary compatibility on Xen. Kangho Kim, Chei-Yol Kim, Sung-In Jung, Hyun-Sup Shin, Jin-soo Kim |
| 2008 | Netchannel: a VMM-level mechanism for continuous, transparentdevice access during VM migration. Sanjay Kumar, Karsten Schwan |
| 2008 | Opening black boxes: using semantic information to combat virtual machine image sprawl. Darrell Reimer, Arun Thomas, Glenn Ammons, Todd W. Mummert, Bowen Alpern, Vasanth Bala |
| 2008 | Policy enforcement and compliance proofs for Xen virtual machines. Bernhard Jansen, Harigovind V. Ramasamy, Matthias Schunter |
| 2008 | Proceedings of the 4th International Conference on Virtual Execution Environments, VEE 2008, Seattle, WA, USA, March 5-7, 2008 David Gregg, Vikram S. Adve, Brian N. Bershad |
| 2008 | Process-shared and persistent code caches. Derek Bruening, Vladimir Kiriansky |
| 2008 | Running a Java VM inside an operating system kernel. Takashi Okumura, Bruce R. Childers, Daniel Mossé |
| 2008 | Scheduling I/O in virtual machine monitors. Diego Ongaro, Alan L. Cox, Scott Rixner |
| 2008 | Trace fragment selection within method-based JVMs. Duane Merrill, Kim M. Hazelwood |
| 2008 | Using hypervisor to provide data secrecy for user applications on a per-page basis. Jisoo Yang, Kang G. Shin |
| 2008 | VMM-based hidden process detection and identification using Lycosid. Stephen T. Jones, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau |
| 2008 | Virtual machine-provided context sensitive page mappings. Nathan E. Rosenblum, Gregory Cooksey, Barton P. Miller |