Sciweavers

SENSYS
2009
ACM
13 years 11 months ago
Darjeeling, a feature-rich VM for the resource poor
The programming and retasking of sensor nodes could benefit greatly from the use of a virtual machine (VM) since byte code is compact, can be loaded on demand, and interpreted on...
Niels Brouwers, Koen Langendoen, Peter Corke
IEEEARES
2009
IEEE
13 years 11 months ago
Investigating the Implications of Virtual Machine Introspection for Digital Forensics
— Researchers and practitioners in computer forensics currently must base their analysis on information that is either incomplete or produced by tools that may themselves be comp...
Kara L. Nance, Brian Hay, Matt Bishop
AINA
2009
IEEE
13 years 11 months ago
Quantifying Artifacts of Virtualization: A Framework for Mirco-Benchmarks
One of the novel benefits of virtualization is the ability to emulate many hosts with a single physical machine. This approach is often used to support at-scale testing for large...
Chris Matthews, Yvonne Coady, Stephen Neville
VEE
2010
ACM
218views Virtualization» more  VEE 2010»
13 years 11 months ago
Improving compiler-runtime separation with XIR
Intense research on virtual machines has highlighted the need for flexible software architectures that allow quick evaluation of new design and implementation techniques. The inte...
Ben Titzer, Thomas Würthinger, Doug Simon, Ma...
SOSP
2003
ACM
14 years 1 months ago
Xen and the art of virtualization
Numerous systems have been designed which use virtualization to subdivide the ample resources of a modern computer. Some require specialized hardware, or cannot support commodity ...
Paul Barham, Boris Dragovic, Keir Fraser, Steven H...
MOBISYS
2005
ACM
14 years 4 months ago
Reincarnating PCs with portable SoulPads
The ability to walk up to any computer, personalize it, and use it as one's own has long been a goal of mobile computing research. We present SoulPad, a new approach based on...
Ramón Cáceres, Casey Carter, Chandra...
OSDI
2002
ACM
14 years 4 months ago
ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay
Current system loggers have two problems: they depend on the integrity of the operating system being logged, and they do not save sufficient information to replay and analyze atta...
George W. Dunlap, Samuel T. King, Sukru Cinar, Mur...