Hardware virtualization

Results: 894



#Item
71secuBT  – Hacking the Hackers with User­Space  Virtualization Mathias Payer <>

secuBT  – Hacking the Hackers with User­Space  Virtualization Mathias Payer <>

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
72SplitX: Split Guest/Hypervisor Execution on Multi-Core  ? Alex Landau?

SplitX: Split Guest/Hypervisor Execution on Multi-Core ? Alex Landau?

Add to Reading List

Source URL: www.mulix.org

Language: English - Date: 2016-06-16 09:04:39
73Mercury: Combining Performance with Dependability Using Self-virtualization ∗ Haibo Chen,Rong Chen,Fengzhe Zhang,Binyu Zang Parallel Processing Institute Fudan University {hbchen,chenrong,fzzhang,byzang}@fudan.edu.cn A

Mercury: Combining Performance with Dependability Using Self-virtualization ∗ Haibo Chen,Rong Chen,Fengzhe Zhang,Binyu Zang Parallel Processing Institute Fudan University {hbchen,chenrong,fzzhang,byzang}@fudan.edu.cn A

Add to Reading List

Source URL: ipads.se.sjtu.edu.cn

Language: English - Date: 2012-01-05 23:25:02
74VirtualBox software allows various guest operating systems to run on top of a host operating system. It provides a software emulation of a basic PC that satisfies the guest OS. VirtualBox runs on Windows, Linux, Macintos

VirtualBox software allows various guest operating systems to run on top of a host operating system. It provides a software emulation of a basic PC that satisfies the guest OS. VirtualBox runs on Windows, Linux, Macintos

Add to Reading List

Source URL: www.svlug.org

Language: English - Date: 2016-04-08 02:08:36
75The Xen hypervisor virtualizing a machine near you Muli Ben-Yehuda   IBM Haifa Research Labs

The Xen hypervisor virtualizing a machine near you Muli Ben-Yehuda IBM Haifa Research Labs

Add to Reading List

Source URL: www.mulix.org

Language: English - Date: 2016-06-16 09:04:15
76HH0809-006) September 20, 2008 Computer Science IBM Research Report Direct Device Assignment for Untrusted Fully-Virtualized Virtual Machines

HH0809-006) September 20, 2008 Computer Science IBM Research Report Direct Device Assignment for Untrusted Fully-Virtualized Virtual Machines

Add to Reading List

Source URL: www.mulix.org

Language: English - Date: 2016-06-16 09:04:37
77A Case for Scaling Applications to Many-core with OS Clustering Xiang Song Haibo Chen  Rong Chen

A Case for Scaling Applications to Many-core with OS Clustering Xiang Song Haibo Chen Rong Chen

Add to Reading List

Source URL: ipads.se.sjtu.edu.cn

Language: English - Date: 2012-01-05 23:24:59
78Sarzyniec Luc Software Engineer 182 avenue du général LeclercNancy, France

Sarzyniec Luc Software Engineer 182 avenue du général LeclercNancy, France

Add to Reading List

Source URL: devpool.org

Language: English
79Bare-Metal Performance for x86 I/O Virtualization Muli Ben-Yehuda Technion & IBM Research HiPEAC Autumn Computing Systems Week in Barcelona

Bare-Metal Performance for x86 I/O Virtualization Muli Ben-Yehuda Technion & IBM Research HiPEAC Autumn Computing Systems Week in Barcelona

Add to Reading List

Source URL: www.mulix.org

Language: English - Date: 2016-06-16 09:04:09
80Scalable I/O—A Well-Architected Way to Do Scalable, Secure and Virtualized I/O Julian Satran Leah Shalev

Scalable I/O—A Well-Architected Way to Do Scalable, Secure and Virtualized I/O Julian Satran Leah Shalev

Add to Reading List

Source URL: www.mulix.org

Language: English - Date: 2016-06-16 09:04:09