Virtualization of Storage and Systems
暂无分享,去创建一个
Yang Song | Aameek Singh | Gabriel Alatorre | Jim Olson | Ann Corrao | Yang Song | Aameek Singh | Gabriel Alatorre | J. Olson | Ann Corrao
[1] Muli Ben-Yehuda,et al. The Turtles Project: Design and Implementation of Nested Virtualization , 2010, OSDI.
[2] Christoph Wegener,et al. Technical Issues of Forensic Investigations in Cloud Computing Environments , 2011, 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.
[3] Aameek Singh,et al. Shares and utilities based power consolidation in virtualized server environments , 2009, 2009 IFIP/IEEE International Symposium on Integrated Network Management.
[4] Kang-Won Lee,et al. Application-aware virtual machine migration in data centers , 2011, 2011 Proceedings IEEE INFOCOM.
[5] Ariel J. Feldman,et al. SPORC: Group Collaboration using Untrusted Cloud Resources , 2010, OSDI.
[6] Xiangliang Zhang,et al. Virtual machine migration in an over-committed cloud , 2012, 2012 IEEE Network Operations and Management Symposium.
[7] Nick Feamster,et al. Trellis: a platform for building flexible, fast virtual networks on commodity hardware , 2008, CoNEXT '08.
[8] HarrisTim,et al. Xen and the art of virtualization , 2003 .
[9] Server-storage virtualization: integration and load balancing in data centers , 2008, HiPC 2008.
[10] Alan L. Cox,et al. Optimizing network virtualization in Xen , 2006 .
[11] Vasileios Pappas,et al. Improving the Scalability of Data Center Networks with Traffic-aware Virtual Machine Placement , 2010, 2010 Proceedings IEEE INFOCOM.
[12] Lixin Gao,et al. How to lease the internet in your spare time , 2007, CCRV.
[13] Ole Agesen,et al. A comparison of software and hardware techniques for x86 virtualization , 2006, ASPLOS XII.
[14] Sandeep Uttamchandani,et al. ChargeView: An integrated tool for implementing chargeback in IT systems , 2008, NOMS 2008 - 2008 IEEE Network Operations and Management Symposium.
[15] Kok-Kiong Yap,et al. Towards software-friendly networks , 2010, APSys '10.
[16] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[17] Xiaohui Liang,et al. Secure provenance: the essential of bread and butter of data forensics in cloud computing , 2010, ASIACCS '10.