Sciweavers

26 search results - page 3 / 6
» Flexible security configuration for virtual machines
Sort
View
93
Voted
CLEIEJ
2006
147views more  CLEIEJ 2006»
14 years 9 months ago
JADIMA: Virtual Machine Architecture for building JAVA Applications on Grid Platforms
This paper describes JADIMA (Java Distributed Machine), a collaborative platform to construct high performance distributed JAVA applications. JADIMA is a system that automatically...
Yudith Cardinale, Eduardo Blanco, Jesús De ...
92
Voted
ACSAC
2009
IEEE
15 years 1 months ago
Justifying Integrity Using a Virtual Machine Verifier
Emerging distributed computing architectures, such as grid and cloud computing, depend on the high integrity execution of each system in the computation. While integrity measuremen...
Joshua Schiffman, Thomas Moyer, Christopher Shal, ...
72
Voted
OSDI
2008
ACM
15 years 9 months ago
Live Migration of Direct-Access Devices
Virtual machine migration greatly aids management by allowing flexible provisioning of resources and decommissioning of hardware for maintenance. However, efforts to improve netwo...
Asim Kadav, Michael M. Swift
CANPC
1999
Springer
15 years 1 months ago
Implementing Application-Specific Cache-Coherence Protocols in Configurable Hardware
Streamlining communication is key to achieving good performance in shared-memory parallel programs. While full hardware support for cache coherence generally offers the best perfo...
David Brooks, Margaret Martonosi
HPCC
2007
Springer
15 years 3 months ago
Towards Scalable and High Performance I/O Virtualization - A Case Study
I/O Virtualization provides a convenient way of device sharing among guest domains in a virtualized platform (e.g. Xen). However, with the ever-increasing number and variety of dev...
Jinpeng Wei, Jeffrey R. Jackson, John A. Wiegert