Sciweavers

1646 search results - page 121 / 330
» Inlining of Virtual Methods
Sort
View
USENIX
2008
15 years 4 months ago
Protection Strategies for Direct Access to Virtualized I/O Devices
Commodity virtual machine monitors forbid direct access to I/O devices by untrusted guest operating systems in order to provide protection and sharing. However, both I/O memory ma...
Paul Willmann, Scott Rixner, Alan L. Cox
FGCS
2006
148views more  FGCS 2006»
15 years 2 months ago
Personal Varrier: Autostereoscopic virtual reality display for distributed scientific visualization
As scientific data sets increase in size, dimensionality, and complexity, new high resolution, interactive, collaborative networked display systems are required to view them in re...
Tom Peterka, Daniel J. Sandin, Jinghua Ge, Javier ...
HPDC
2008
IEEE
15 years 8 months ago
Combining batch execution and leasing using virtual machines
As cluster computers are used for a wider range of applications, we encounter the need to deliver resources at particular times, to meet particular deadlines, and/or at the same t...
Borja Sotomayor, Kate Keahey, Ian T. Foster
121
Voted
NCA
2007
IEEE
15 years 8 months ago
Towards IQ-Appliances: Quality-awareness in Information Virtualization
Our research addresses two important problems that arise in modern large-scale distributed systems: (1) the necessity to virtualize their data flows by applying actions such as ï...
Radhika Niranjan, Ada Gavrilovska, Karsten Schwan,...
SENSYS
2006
ACM
15 years 8 months ago
Virtual high-resolution for sensor networks
The resolution at which a sensor network collects data is a crucial parameter of performance since it governs the range of applications that are feasible to be developed using tha...
Aman Kansal, William J. Kaiser, Gregory J. Pottie,...