Sciweavers

1234 search results - page 9 / 247
» Privacy-preserving Virtual Machine
Sort
View
VEE
2006
ACM
155views Virtualization» more  VEE 2006»
15 years 5 months ago
A feather-weight virtual machine for windows applications
Many fault-tolerant and intrusion-tolerant systems require the ability to execute unsafe programs in a realistic environment without leaving permanent damages. Virtual machine tec...
Yang Yu, Fanglu Guo, Susanta Nanda, Lap-Chung Lam,...
ASPLOS
2012
ACM
13 years 7 months ago
ELI: bare-metal performance for I/O virtualization
Direct device assignment enhances the performance of guest virtual machines by allowing them to communicate with I/O devices without host involvement. But even with device assignm...
Abel Gordon, Nadav Amit, Nadav Har'El, Muli Ben-Ye...
CONEXT
2008
ACM
15 years 1 months ago
CoreLab: an emerging network testbed employing hosted virtual machine monitor
Network testbeds for developing, deploying, and experimenting with new network services have evolved as recent rapid progress in virtualization technology. This paper proposes a n...
Akihiro Nakao, Ryota Ozaki, Yuji Nishida
ACE
2004
199views Education» more  ACE 2004»
15 years 27 days ago
VELNET (Virtual Environment for Learning Networking)
The problems of providing a real, physical specialist laboratory to teach computer networking such as, the lack of funding and physical space and the risks and threats to the netw...
Bruce Kneale, Ain Y. De Horta, Ilona Box
CSSE
2008
IEEE
15 years 6 months ago
Design and Implementation of the Virtual Machine Constructing on Register
: The technology of virtual machines is widely applied in many fields, such as code transplanting, cross-platform computing, and hardware simulation. The main purpose is to simulat...
Weibo Xie, Fu Ting