Sciweavers

1194 search results - page 11 / 239
» Virtualization of Hardware - Introduction and Survey
Sort
View
CCS
2009
ACM
15 years 8 months ago
Secure in-VM monitoring using hardware virtualization
Kernel-level attacks or rootkits can compromise the security of an operating system by executing with the privilege of the kernel. Current approaches use virtualization to gain hi...
Monirul I. Sharif, Wenke Lee, Weidong Cui, Andrea ...
SIGGRAPH
1993
ACM
15 years 6 months ago
Autocalibration for virtual environments tracking hardware
We describe two instances in which precise mechanical calibration of virtual environments equipment has been replaced by automated algorithmic calibration through software that en...
Stefan Gottschalk, John F. Hughes
138
Voted
VEE
2006
ACM
178views Virtualization» more  VEE 2006»
15 years 7 months ago
Impact of virtual execution environments on processor energy consumption and hardware adaptation
During recent years, microprocessor energy consumption has been surging and efforts to reduce power and energy have received a lot of attention. At the same time, virtual executio...
Shiwen Hu, Lizy Kurian John
IEEEPACT
2006
IEEE
15 years 8 months ago
Hardware support for spin management in overcommitted virtual machines
Multiprocessor operating systems (OSs) pose several unique and conflicting challenges to System Virtual Machines (System VMs). For example, most existing system VMs resort to gan...
Philip M. Wells, Koushik Chakraborty, Gurindar S. ...