default search action
7th VEE 2011: Newport Beach, CA, USA
- Erez Petrank, Doug Lea:
Proceedings of the 7th International Conference on Virtual Execution Environments, VEE 2011, Newport Beach, CA, USA, March 9-11, 2011 (co-located with ASPLOS 2011). ACM 2011, ISBN 978-1-4503-0687-4
Keynote
- David F. Bacon:
Virtualization in the age of heterogeneous machines. 1-2
Performance monitoring
- Jiaqing Du, Nipun Sehrawat, Willy Zwaenepoel:
Performance profiling of virtual machines. 3-14 - Ruslan Nikolaev, Godmar Back:
Perfctr-Xen: a framework for performance counter virtualization. 15-26 - Qin Zhao, David Koh, Syed Raza, Derek Bruening, Weng-Fai Wong, Saman P. Amarasinghe:
Dynamic cache contention detection in multi-threaded applications. 27-38
Configuration
- Kun Wang, Jia Rao, Cheng-Zhong Xu:
Rethink the virtual machine template. 39-50 - Emmanuel Cecchet, Rahul Singh, Upendra Sharma, Prashant J. Shenoy:
Dolly: virtualization-driven database provisioning for the cloud. 51-62 - Michael Le, Yuval Tamir:
ReHype: enabling VM survival across hypervisor failures. 63-74
Recovery
- Eunbyung Park, Bernhard Egger, Jaejin Lee:
Fast and space-efficient virtual machine checkpointing. 75-86 - Irene Zhang, Alex Garthwaite, Yury Baskakov, Kenneth C. Barr:
Fast restore of checkpointed memory using working set estimation. 87-98 - Kenichi Kourai:
Fast and correct performance recovery of operating systems using a virtual machine monitor. 99-110
Migration
- Petter Svärd, Benoit Hudzia, Johan Tordsson, Erik Elmroth:
Evaluation of delta compression techniques for efficient live migration of large virtual machines. 111-120 - Timothy Wood, K. K. Ramakrishnan, Prashant J. Shenoy, Jacobus E. van der Merwe:
CloudNet: dynamic pooling of cloud resources by live WAN migration of virtual machines. 121-132 - Jie Zheng, Tze Sing Eugene Ng, Kunwadee Sripanidkulchai:
Workload-aware live storage migration for clouds. 133-144
Security
- Lionel Litty, David Lie:
Patch auditing in infrastructure as a service clouds. 145-156 - Mathias Payer, Thomas R. Gross:
Fine-grained user-space security through virtualization. 157-168
Virtualization techniques
- John R. Lange, Kevin T. Pedretti, Peter A. Dinda, Patrick G. Bridges, Chang Bae, Philip Soltero, Alexander Merritt:
Minimal-overhead virtualization of a large scale supercomputer. 169-180 - Lei Xia, Sanjay Kumar, Xue Yang, Praveen Gopalakrishnan, York Liu, Sebastian Schoenberg, Xingang Guo:
Virtual WiFi: bring virtualization from wired to wireless. 181-192 - John R. Lange, Peter A. Dinda:
SymCall: symbiotic virtualization through VMM-to-guest upcalls. 193-204
Memory management
- Dan Williams, Hani Jamjoom, Yew-Huey Liu, Hakim Weatherspoon:
Overdriver: handling memory overload in an oversubscribed cloud. 205-216 - Xiaolin Wang, Jiarui Zang, Zhenlin Wang, Yingwei Luo, Xiaoming Li:
Selective hardware/software memory virtualization. 217-226 - Amitabha Roy, Steven Hand, Tim Harris:
Hybrid binary rewriting for memory access instrumentation. 227-238
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.