Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Hardware virtualization

Known as: %22virtual hardware%22, Platform virtualization, System virtualization 
Computer hardware virtualization is the virtualization of computers as complete hardware platforms, certain logical abstractions of their componentry… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
Emerging technologies such as the Internet of Things (IoT) require latency-aware computation for real-time application processing… Expand
Is this relevant?
Review
2018
Review
2018
Network virtualization (NV) is considered as an enabling tool to remove the gradual ossification of current Internet. In the… Expand
  • figure 1
  • table I
  • figure 2
  • figure 3
  • table II
Is this relevant?
Review
2017
Review
2017
Virtualization techniques effectively handle the growing demand for computing, storage, and communication resources in large… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Kernel-level attacks or rootkits can compromise the security of an operating system by executing with the privilege of the kernel… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that… Expand
  • figure 2
  • figure 1
  • figure 3
  • table 1
  • table 2
Is this relevant?
Highly Cited
2008
Highly Cited
2008
"Cloud" computing – a relatively recent term, builds on decades of research in virtualization, distributed computing, utility… Expand
Is this relevant?
Highly Cited
2005
Highly Cited
2005
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU’s memory cache… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Numerous systems have been designed which use virtualization to subdivide the ample resources of a modern computer. Some require… Expand
  • table 2
  • figure 1
  • figure 2
  • figure 3
  • table 6
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Current system loggers have two problems: they depend on the integrity of the operating system being logged, and they do not save… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Three experimental environments traditionally support network and distributed systems research: network emulators, network… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?