Sciweavers

VEE
2006
ACM
142views Virtualization» more  VEE 2006»
14 years 4 months ago
Secure and practical defense against code-injection attacks using software dynamic translation
One of the most common forms of security attacks involves exploiting a vulnerability to inject malicious code into an executing application and then cause the injected code to be ...
Wei Hu, Jason Hiser, Daniel Williams, Adrian Filip...
VEE
2006
ACM
155views Virtualization» more  VEE 2006»
14 years 4 months ago
A feather-weight virtual machine for windows applications
Many fault-tolerant and intrusion-tolerant systems require the ability to execute unsafe programs in a realistic environment without leaving permanent damages. Virtual machine tec...
Yang Yu, Fanglu Guo, Susanta Nanda, Lap-Chung Lam,...
VEE
2010
ACM
219views Virtualization» more  VEE 2010»
14 years 5 months ago
DBT path selection for holistic memory efficiency and performance
Apala Guha, Kim M. Hazelwood, Mary Lou Soffa
VEE
2009
ACM
240views Virtualization» more  VEE 2009»
14 years 5 months ago
Memory buddies: exploiting page sharing for smart colocation in virtualized data centers
Many data center virtualization solutions, such as VMware ESX, employ content-based page sharing to consolidate the resources of multiple servers. Page sharing identifies virtual...
Timothy Wood, Gabriel Tarasuk-Levin, Prashant J. S...
VEE
2009
ACM
171views Virtualization» more  VEE 2009»
14 years 5 months ago
Dynamic memory balancing for virtual machines
Virtualization essentially enables multiple operating systems and applications to run on one physical computer by multiplexing hardware resources. A key motivation for applying vi...
Weiming Zhao, Zhenlin Wang
VEE
2009
ACM
613views Virtualization» more  VEE 2009»
14 years 5 months ago
BitVisor: a thin hypervisor for enforcing i/o device security
Virtual machine monitors (VMMs), including hypervisors, are a popular platform for implementing various security functionalities. However, traditional VMMs require numerous compon...
Takahiro Shinagawa, Hideki Eiraku, Kouichi Tanimot...
VEE
2009
ACM
146views Virtualization» more  VEE 2009»
14 years 5 months ago
Demystifying magic: high-level low-level programming
r of high-level languages lies in their abstraction over hardware and software complexity, leading to greater security, better reliability, and lower development costs. However, o...
Daniel Frampton, Stephen M. Blackburn, Perry Cheng...
VEE
2009
ACM
246views Virtualization» more  VEE 2009»
14 years 5 months ago
Tracing for web 3.0: trace compilation for the next generation web applications
Today’s web applications are pushing the limits of modern web browsers. The emergence of the browser as the platform of choice for rich client-side applications has shifted the ...
Mason Chang, Edwin W. Smith, Rick Reitmaier, Micha...
VEE
2009
ACM
146views Virtualization» more  VEE 2009»
14 years 5 months ago
Achieving 10 Gb/s using safe and transparent network interface virtualization
: © Achieving 10 Gb/s using Safe and Transparent Network Interface Virtualization Kaushik Kumar Ram, Jose Renato Santos, Yoshio Turner, Alan L. Cox, Scott Rixner HP Laboratories H...
Kaushik Kumar Ram, Jose Renato Santos, Yoshio Turn...
VEE
2009
ACM
172views Virtualization» more  VEE 2009»
14 years 5 months ago
Entropy: a consolidation manager for clusters
Clusters provide powerful computing environments, but in practice much of this power goes to waste, due to the static allocation of tasks to nodes, regardless of their changing co...
Fabien Hermenier, Xavier Lorca, Jean-Marc Menaud, ...