Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 61 matches
- 2023
- Stefan Bosse:
Rule-based High-level Hardware-RTL Synthesis of Algorithms, Virtualizing Machines, and Communication Protocols with FPGAs based on Concurrent Communicating Sequential Processes and the ConPro Synthesis Framework. CoRR abs/2302.02959 (2023) - 2022
- Masaya Sato, Ryosuke Nakamura, Toshihiro Yamauchi, Hideo Taniguchi:
Improving Transparency of Hardware Breakpoints with Virtual Machine Introspection. IIAI-AAI 2022: 113-117 - 2021
- Dingji Li, Zeyu Mi, Yubin Xia, Binyu Zang, Haibo Chen, Haibing Guan:
TwinVisor: Hardware-isolated Confidential Virtual Machines for ARM. SOSP 2021: 638-654 - 2020
- Chih-Hao Huang, Bo-Hong Huang, Tin-Yu Wu:
Hardware Resource Reliability Analysis based on Deep Learning for Virtual Machine Deployment Optimization. GCCE 2020: 726-727 - Stella Bitchebe, Djob Mvondo, Alain Tchana, Laurent Réveillère, Noël De Palma:
Intel Page Modification Logging, a hardware virtualization feature: study and improvement for virtual machine working set estimation. CoRR abs/2001.09991 (2020) - 2019
- Zihan Yang, Zeyu Mi, Yubin Xia:
Undertow: An Intra-Kernel Isolation Mechanism for Hardware-Assisted Virtual Machines. SOSE 2019 - 2017
- Min Zhu, Bibo Tu, Wei Wei, Dan Meng:
HA-VMSI: A Lightweight Virtual Machine Isolation Approach with Commodity Hardware for ARM. VEE 2017: 242-256 - 2016
- Francois Serman:
Reducing hardware TCB in favor of certifiable virtual machine monitor. (Réduction des besoins de confiance matérielle pour le développement d'un hyperviseur certifié). Lille University of Science and Technology, France, 2016 - Dionisio Machado Leite Filho:
The influence of hardware and software information in the laaS services: an approach about performance in virtual machines in clouds. University of São Paulo, Brazil, 2016 - Suchakrapani Datt Sharma, Hani Nemati, Genevieve Bastien, Michel R. Dagenais:
Low Overhead Hardware-Assisted Virtual Machine Analysis and Profiling. GLOBECOM Workshops 2016: 1-6 - 2015
- Surachai Thongkaew, Tsuyoshi Isshiki, Dongju Li, Hiroaki Kunieda:
Register-Based Process Virtual Machine Acceleration Using Hardware Extension with Hybrid Execution. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(12): 2505-2518 (2015) - Seongwook Jin, Jeongseob Ahn, Jinho Seol, Sanghoon Cha, Jaehyuk Huh, Seungryoul Maeng:
H-SVM: Hardware-Assisted Secure Virtual Machines under a Vulnerable Hypervisor. IEEE Trans. Computers 64(10): 2833-2846 (2015) - Sa Wang, Wenbo Zhang, Tao Wang, Chunyang Ye, Tao Huang:
VMon: Monitoring and Quantifying Virtual Machine Interference via Hardware Performance Counter. COMPSAC 2015: 399-408 - Wei-Jen Wang, Hung-Lin Huang, Shan-Hao Chuang, Shao-Jui Chen, Chia Hung Kao, Deron Liang:
Virtual machines of high availability using hardware-assisted failure detection. ICCST 2015: 1-6 - 2014
- Cuong Manh Pham, Zachary Estrada, Phuong Cao, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:
Reliability and Security Monitoring of Virtual Machines Using Hardware Architectural Invariants. DSN 2014: 13-24 - Yutao Liu, Yubin Xia, Haibing Guan, Binyu Zang, Haibo Chen:
Concurrent and consistent virtual machine introspection with hardware transactional memory. HPCA 2014: 416-427 - Marcello Pellicciari, Alberto Vergnano, Giovanni Berselli:
Hardware-in-the-Loop Mechatronic Virtual Prototyping of a high-speed capsule filling machine. MESA 2014: 1-6 - 2012
- Koushik Chakraborty, Philip M. Wells, Gurindar S. Sohi:
Supporting Overcommitted Virtual Machines through Hardware Spin Detection. IEEE Trans. Parallel Distributed Syst. 23(2): 353-366 (2012) - Michael Lackner, Reinhard Berlach, Johannes Loinig, Reinhold Weiss, Christian Steger:
Towards the Hardware Accelerated Defensive Virtual Machine - Type and Bound Protection. CARDIS 2012: 1-15 - Jim Bardgett, Cliff Changchun Zou:
nSwitching: Virtual Machine aware relay hardware switching to improve intra-NIC Virtual Machine traffic. ICC 2012: 2700-2705 - Michael Velten, Frederic Stumpf:
Secure and Privacy-Aware Multiplexing of Hardware-Protected TPM Integrity Measurements among Virtual Machines. ICISC 2012: 324-336 - Jiageng Yu, Peng Zhou, Yanjun Wu, Chen Zhao:
Virtual Machine Replay Update: Improved Implementation for Modern Hardware Architecture. SERE (Companion) 2012: 1-6 - 2011
- Changwoo Min, Inhyuk Kim, Taehyoung Kim, Young Ik Eom:
Hardware assisted dynamic memory balancing in virtual machines. IEICE Electron. Express 8(10): 748-754 (2011) - Joshua S. Auerbach, David F. Bacon, Perry Cheng, Rodric M. Rabbah, Sunil Shukla:
Virtualization of heterogeneous machines hardware description in a synthesizable object-oriented language. DAC 2011: 890-894 - Jonas Pfoh, Christian A. Schneider, Claudia Eckert:
Nitro: Hardware-Based System Call Tracing for Virtual Machines. IWSEC 2011: 96-112 - 2010
- Joonas Tyystjärvi, Tero Säntti, Juha Plosila:
Heap access optimizations for a hardware-accelerated Java virtual machine. SoC 2010: 125-128 - Huacai Chen, Hai Jin, Kan Hu:
XenHVMAcct: Accurate CPU Time Accounting for Hardware-Assisted Virtual Machine. PDCAT 2010: 191-198 - Loïc Duflot, Olivier Grumelard, Olivier Levillain, Benjamin Morin:
On the Limits of Hypervisor- and Virtual Machine Monitor-Based Isolation. Towards Hardware-Intrinsic Security 2010: 349-366 - 2009
- Peter Bertels, Wim Heirman, Erik H. D'Hollander, Dirk Stroobandt:
Efficient memory management for hardware accelerated Java Virtual Machines. ACM Trans. Design Autom. Electr. Syst. 14(4): 48:1-48:18 (2009) - Zhiyuan Shao, Hai Jin, De Zhang:
A performance study of web server based on Hardware-assisted Virtual Machine. AICCSA 2009: 837-840
skipping 31 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-03-29 02:48 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint