Circuit Switched VM Networks for Zero-Copy IO
暂无分享,去创建一个
[1] Calton Pu,et al. Fast networking with socket-outsourcing in hosted virtual machine environments , 2009, SAC '09.
[2] Xiaolan Zhang,et al. XenSocket: A High-Throughput Interdomain Transport for Virtual Machines , 2007, Middleware.
[3] Don Marti,et al. OSv - Optimizing the Operating System for Virtual Machines , 2014, USENIX Annual Technical Conference.
[4] Matt Ganis,et al. SOCKS Protocol Version 5 , 1996, RFC.
[5] T. S. Eugene Ng,et al. The Impact of Virtualization on Network Performance of Amazon EC2 Data Center , 2010, 2010 Proceedings IEEE INFOCOM.
[6] Jin-Soo Kim,et al. Inter-domain socket communications supporting high performance and full binary compatibility on Xen , 2008, VEE '08.
[7] Luigi Rizzo,et al. netmap: A Novel Framework for Fast Packet I/O , 2012, USENIX ATC.
[8] Cristina Nita-Rotaru,et al. Taking a long look at QUIC , 2019, Commun. ACM.
[9] Ramana Rao Kompella,et al. Opportunistic flooding to improve TCP transmit performance in virtualized clouds , 2011, SOCC '11.
[10] Albert G. Greenberg,et al. Data center TCP (DCTCP) , 2010, SIGCOMM '10.
[11] Jun Zhu,et al. Breaking up is hard to do: security and functionality in a commodity hypervisor , 2011, SOSP.
[12] Florian Schmidt,et al. My VM is Lighter (and Safer) than your Container , 2017, SOSP.
[13] Jian Wang,et al. XenLoop: a transparent high performance inter-VM network loopback , 2008, HPDC '08.
[14] E. Tronci,et al. 1996 , 1997, Affair of the Heart.
[15] Cristina Nita-Rotaru,et al. Taking a long look at QUIC: an approach for rigorous evaluation of rapidly evolving transport protocols , 2017, Internet Measurement Conference.
[16] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[17] Paramvir Bahl,et al. The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.
[18] J. Rutkowska. Qubes OS Architecture , 2010 .
[19] Ramana Rao Kompella,et al. vSnoop: Improving TCP Throughput in Virtualized Environments via Acknowledgement Offload , 2010, 2010 ACM/IEEE International Conference for High Performance Computing, Networking, Storage and Analysis.
[20] Jon Crowcroft,et al. Jitsu: Just-In-Time Summoning of Unikernels , 2015, NSDI.
[21] K. K. Ramakrishnan,et al. NetVM: High Performance and Flexible Networking Using Virtualization on Commodity Platforms , 2014, IEEE Transactions on Network and Service Management.
[22] Feng Qian,et al. An in-depth understanding of multipath TCP on mobile devices: measurement and system design , 2016, MobiCom.
[23] Mark Handley,et al. Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics , 2001, USENIX Security Symposium.
[24] Alan L. Cox,et al. Optimizing network virtualization in Xen , 2006 .
[25] Roberto Bifulco,et al. ClickOS and the Art of Network Function Virtualization , 2014, NSDI.
[26] Nita-RotaruCristina,et al. Taking a long look at QUIC , 2019 .
[27] Andrew Warfield,et al. Safe Hardware Access with the Xen Virtual Machine Monitor , 2007 .
[28] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.