暂无分享,去创建一个
[1] Laxmikant V. Kale,et al. Faucets: efficient resource allocation on the computational grid , 2004 .
[2] Ian T. Foster,et al. The anatomy of the grid: enabling scalable virtual organizations , 2001, Proceedings First IEEE/ACM International Symposium on Cluster Computing and the Grid.
[3] Andrew Warfield,et al. Xen and the art of virtualization , 2003, SOSP '03.
[4] Scott Devine,et al. Disco: running commodity operating systems on scalable multiprocessors , 1997, TOCS.
[5] Laxmikant V. Kalé,et al. Faucets: efficient resource allocation on the computational grid , 2004, International Conference on Parallel Processing, 2004. ICPP 2004..
[6] Steven Tuecke,et al. The Physiology of the Grid An Open Grid Services Architecture for Distributed Systems Integration , 2002 .
[7] Dawson R. Engler,et al. Exokernel: an operating system architecture for application-level resource management , 1995, SOSP.
[8] Laxmikant V. Kalé,et al. Adaptive MPI , 2003, LCPC.
[9] Laxmikant V. Kalé,et al. CHARM++: a portable concurrent object oriented system based on C++ , 1993, OOPSLA '93.
[10] Beng-Hong Lim,et al. Virtualizing I/O Devices on VMware Workstation's Hosted Virtual Machine Monitor , 2001, USENIX Annual Technical Conference, General Track.
[11] Gregory A. Koenig,et al. Design of an Economics-Based Software Infrastructure for Secure Utility Computing on Supercomputing Clusters , 2004 .
[12] Gregory A. Koenig,et al. Using message-driven objects to mask latency in grid computing applications , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[13] Steven Hand,et al. PDB: pervasive debugging with Xen , 2004, Fifth IEEE/ACM International Workshop on Grid Computing.
[14] WhitakerAndrew,et al. Rethinking the Design of Virtual Machine Monitors , 2005 .
[15] Willy Zwaenepoel,et al. Diagnosing performance overheads in the xen virtual machine environment , 2005, VEE '05.
[16] James E. Smith,et al. The architecture of virtual machines , 2005, Computer.
[17] Gerald J. Popek,et al. Formal requirements for virtualizable third generation architectures , 1974, SOSP '73.
[18] Samuel T. King,et al. ReVirt: enabling intrusion analysis through virtual-machine logging and replay , 2002, OPSR.
[19] K. F. Seiden,et al. The auditing facility for a VMM security kernel , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[20] Love H. Seawright,et al. VM/370 - A Study of Multiplicity and Usefulness , 1979, IBM Syst. J..
[21] R. Sailer,et al. sHype : Secure Hypervisor Approach to Trusted Virtualized Systems , 2005 .
[22] Mendel Rosenblum,et al. Cellular disco: resource management using virtual clusters on shared-memory multiprocessors , 2000, TOCS.
[23] David E. Culler,et al. PlanetLab: an overlay testbed for broad-coverage services , 2003, CCRV.
[24] Renato J. O. Figueiredo,et al. A case for grid computing on virtual machines , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..
[25] James E. Smith,et al. Virtual machines - versatile platforms for systems and processes , 2005 .
[26] Thiemo Voigt,et al. SILK: Scout Paths in the Linux Kernel , 2001 .
[27] Robert J. Creasy,et al. The Origin of the VM/370 Time-Sharing System , 1981, IBM J. Res. Dev..
[28] Carl A. Waldspurger,et al. Memory resource management in VMware ESX server , 2002, OSDI '02.
[29] Marianne Shaw,et al. Scale and performance in the Denali isolation kernel , 2002, OSDI '02.
[30] Marianne Shaw,et al. Rethinking the design of virtual machine monitors , 2005, Computer.