A Bare-Metal and Asymmetric Partitioning Approach to Client Virtualization
暂无分享,去创建一个
Naixue Xiong | Athanasios V. Vasilakos | Yaoxue Zhang | Yue-Zhi Zhou | Hao Liu | A. Vasilakos | N. Xiong | Yuezhi Zhou | Yaoxue Zhang | Hao Liu
[1] Jan Mádle,et al. VMware View 4 , 2010 .
[2] Xuxian Jiang,et al. Countering kernel rootkits with lightweight hook protection , 2009, CCS.
[3] qdcat. Quake III Arena地图制作 , 2002 .
[4] MyST·拉拉. Counter Strike 穿透射击高手图解 , 2004 .
[5] I-Ling Yen,et al. QoS-Driven Service Composition with Reconfigurable Services , 2013, IEEE Transactions on Services Computing.
[6] A. C. Primavesi,et al. The Norton AntiVirus , 1995 .
[7] Gil Neiger,et al. Intel ® Virtualization Technology for Directed I/O , 2006 .
[8] Andrew Warfield,et al. Facilitating the Development of Soft Devices , 2005, USENIX Annual Technical Conference, General Track.
[9] Jason Nieh,et al. Measuring thin-client performance using slow-motion benchmarking , 2001, TOCS.
[10] Wenke Lee,et al. Ether: malware analysis via hardware virtualization extensions , 2008, CCS.
[11] Asim Kadav,et al. Live migration of direct-access devices , 2008, OPSR.
[12] R. Schiffer,et al. INTRODUCTION , 1988, Neurology.
[13] Peter Druschel,et al. Resource containers: a new facility for resource management in server systems , 1999, OSDI '99.
[14] Peter T. Breuer,et al. The Network Block Device , 2000 .
[15] Andrew Warfield,et al. Safe Hardware Access with the Xen Virtual Machine Monitor , 2007 .
[16] Mahendra Ramachandran,et al. New Client Virtualization Usage Models Using IntelŴVirtualization Technology , 2006 .
[17] Naixue Xiong,et al. AVMM: Virtualize network client with a bare-metal and asymmetric partitioning approach , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[18] Dutch T. Meyer,et al. Parallax: virtual disks for virtual machines , 2008, Eurosys '08.
[19] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[20] Zhou Wei,et al. Scalable Transactions for Web Applications in the Cloud , 2009, Euro-Par.
[21] Prashant J. Shenoy,et al. Hierarchical Scheduling for Symmetric Multiprocessors , 2008, IEEE Transactions on Parallel and Distributed Systems.
[22] Dhabaleswar K. Panda,et al. High Performance VMM-Bypass I/O in Virtual Machines , 2006, USENIX Annual Technical Conference, General Track.
[23] Zhou Wei,et al. CloudTPS: Scalable Transactions for Web Applications in the Cloud , 2012, IEEE Trans. Serv. Comput..
[24] Carl A. Waldspurger,et al. Memory resource management in VMware ESX server , 2002, OSDI '02.
[25] Muli Ben-Yehuda,et al. Direct Device Assignment for Untrusted Fully-Virtualized Virtual Machines , 2008 .
[26] Xuxian Jiang,et al. Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction , 2007, CCS '07.
[27] Peter A. Dinda,et al. Investigating virtual passthrough I/O on commodity devices , 2009, OPSR.
[28] Pedro F. Miret,et al. Wikipedia , 2008, Monatsschrift für Deutsches Recht.
[29] Karsten Schwan,et al. High performance and scalable I/O virtualization via self-virtualized devices , 2007, HPDC '07.
[30] Gil Neiger,et al. Intel virtualization technology , 2005, Computer.
[31] James E. Smith,et al. The architecture of virtual machines , 2005, Computer.
[32] Jimi Xenidis,et al. Utilizing IOMMUs for Virtualization in Linux and Xen Muli , 2006 .
[33] No License,et al. Intel ® 64 and IA-32 Architectures Software Developer ’ s Manual Volume 3 A : System Programming Guide , Part 1 , 2006 .
[34] Peng Ning,et al. HIMA: A Hypervisor-Based Integrity Measurement Agent , 2009, 2009 Annual Computer Security Applications Conference.