


default search action
7th VEE 2011: Newport Beach, CA, USA
- Erez Petrank, Doug Lea:

Proceedings of the 7th International Conference on Virtual Execution Environments, VEE 2011, Newport Beach, CA, USA, March 9-11, 2011 (co-located with ASPLOS 2011). ACM 2011, ISBN 978-1-4503-0687-4
Keynote
- David F. Bacon:

Virtualization in the age of heterogeneous machines. 1-2
Performance monitoring
- Jiaqing Du, Nipun Sehrawat, Willy Zwaenepoel:

Performance profiling of virtual machines. 3-14 - Ruslan Nikolaev

, Godmar Back:
Perfctr-Xen: a framework for performance counter virtualization. 15-26 - Qin Zhao, David Koh, Syed Raza, Derek Bruening, Weng-Fai Wong

, Saman P. Amarasinghe
:
Dynamic cache contention detection in multi-threaded applications. 27-38
Configuration
- Kun Wang, Jia Rao, Cheng-Zhong Xu

:
Rethink the virtual machine template. 39-50 - Emmanuel Cecchet, Rahul Singh

, Upendra Sharma, Prashant J. Shenoy
:
Dolly: virtualization-driven database provisioning for the cloud. 51-62 - Michael Le, Yuval Tamir:

ReHype: enabling VM survival across hypervisor failures. 63-74
Recovery
- Eunbyung Park, Bernhard Egger

, Jaejin Lee:
Fast and space-efficient virtual machine checkpointing. 75-86 - Irene Zhang, Alex Garthwaite, Yury Baskakov, Kenneth C. Barr

:
Fast restore of checkpointed memory using working set estimation. 87-98 - Kenichi Kourai

:
Fast and correct performance recovery of operating systems using a virtual machine monitor. 99-110
Migration
- Petter Svärd, Benoit Hudzia, Johan Tordsson, Erik Elmroth:

Evaluation of delta compression techniques for efficient live migration of large virtual machines. 111-120 - Timothy Wood

, K. K. Ramakrishnan
, Prashant J. Shenoy
, Jacobus E. van der Merwe:
CloudNet: dynamic pooling of cloud resources by live WAN migration of virtual machines. 121-132 - Jie Zheng, Tze Sing Eugene Ng, Kunwadee Sripanidkulchai:

Workload-aware live storage migration for clouds. 133-144
Security
- Lionel Litty, David Lie:

Patch auditing in infrastructure as a service clouds. 145-156 - Mathias Payer, Thomas R. Gross:

Fine-grained user-space security through virtualization. 157-168
Virtualization techniques
- John R. Lange, Kevin T. Pedretti, Peter A. Dinda, Patrick G. Bridges

, Chang Bae, Philip Soltero, Alexander Merritt:
Minimal-overhead virtualization of a large scale supercomputer. 169-180 - Lei Xia, Sanjay Kumar, Xue Yang, Praveen Gopalakrishnan, York Liu, Sebastian Schoenberg, Xingang Guo:

Virtual WiFi: bring virtualization from wired to wireless. 181-192 - John R. Lange, Peter A. Dinda:

SymCall: symbiotic virtualization through VMM-to-guest upcalls. 193-204
Memory management
- Dan Williams, Hani Jamjoom, Yew-Huey Liu, Hakim Weatherspoon:

Overdriver: handling memory overload in an oversubscribed cloud. 205-216 - Xiaolin Wang, Jiarui Zang, Zhenlin Wang, Yingwei Luo, Xiaoming Li:

Selective hardware/software memory virtualization. 217-226 - Amitabha Roy, Steven Hand, Tim Harris:

Hybrid binary rewriting for memory access instrumentation. 227-238

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














