VEE B

19 papers

YearTitle / Authors
2008A method specialisation and virtualised execution environment for Java.
Andrew M. Cheadle, A. J. Field, Johan Nyström-Persson
2008A principled approach to nondeferred reference-counting garbage collection.
Pramod G. Joisha
2008Applications of a feather-weight virtual machine.
Yang Yu, Hariharan Kolam, Lap-Chung Lam, Tzi-cker Chiueh
2008Cell GC: using the cell synergistic processor as a garbage collection coprocessor.
Chen-Yong Cher, Michael Gschwind
2008Characterization & analysis of a server consolidation benchmark.
Padma Apparao, Ravi R. Iyer, Xiaomin Zhang, Donald Newell, Tom Adelmeyer
2008Execution replay of multiprocessor virtual machines.
George W. Dunlap, Dominic G. Lucchetti, Michael A. Fetterman, Peter M. Chen
2008Improving Xen security through disaggregation.
Derek Gordon Murray, Grzegorz Milos, Steven Hand
2008Inter-domain socket communications supporting high performance and full binary compatibility on Xen.
Kangho Kim, Chei-Yol Kim, Sung-In Jung, Hyun-Sup Shin, Jin-soo Kim
2008Netchannel: a VMM-level mechanism for continuous, transparentdevice access during VM migration.
Sanjay Kumar, Karsten Schwan
2008Opening black boxes: using semantic information to combat virtual machine image sprawl.
Darrell Reimer, Arun Thomas, Glenn Ammons, Todd W. Mummert, Bowen Alpern, Vasanth Bala
2008Policy enforcement and compliance proofs for Xen virtual machines.
Bernhard Jansen, Harigovind V. Ramasamy, Matthias Schunter
2008Proceedings of the 4th International Conference on Virtual Execution Environments, VEE 2008, Seattle, WA, USA, March 5-7, 2008
David Gregg, Vikram S. Adve, Brian N. Bershad
2008Process-shared and persistent code caches.
Derek Bruening, Vladimir Kiriansky
2008Running a Java VM inside an operating system kernel.
Takashi Okumura, Bruce R. Childers, Daniel Mossé
2008Scheduling I/O in virtual machine monitors.
Diego Ongaro, Alan L. Cox, Scott Rixner
2008Trace fragment selection within method-based JVMs.
Duane Merrill, Kim M. Hazelwood
2008Using hypervisor to provide data secrecy for user applications on a per-page basis.
Jisoo Yang, Kang G. Shin
2008VMM-based hidden process detection and identification using Lycosid.
Stephen T. Jones, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau
2008Virtual machine-provided context sensitive page mappings.
Nathan E. Rosenblum, Gregory Cooksey, Barton P. Miller