Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,896,659 papers from all fields of science
Search
Sign In
Create Free Account
Hypervisor
Known as:
Host Machine
, Hypervisors
, Hyper visor
Expand
A hypervisor or virtual machine monitor (VMM) is a piece of computer software, firmware or hardware that creates and runs virtual machines. A…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
"Classic" Mac OS
ARM architecture
Adeos
Bare machine
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
CIVSched: A Communication-Aware Inter-VM Scheduling Technique for Decreased Network Latency between Co-Located VMs
Bei Guan
,
Jingzheng Wu
,
Yongji Wang
,
S. Khan
IEEE Transactions on Cloud Computing
2014
Corpus ID: 8719888
Server consolidation in cloud computing environments makes it possible for multiple servers or desktops to run on a single…
Expand
2014
2014
Honeypots deployment for the analysis and visualization of malware activity and malicious connections
Ioannis Koniaris
,
G. Papadimitriou
,
Petros Nicopolitidis
,
M. Obaidat
IEEE International Conference on Communications…
2014
Corpus ID: 14759636
Honeypots are systems aimed at deceiving threat agents. In most of the cases the latter are cyber attackers with financial…
Expand
2013
2013
Defense-in-Depth Against Malicious Insiders in the Cloud
F. Rocha
,
Thomas Gross
,
A. Moorsel
IEEE International Conference on Cloud…
2013
Corpus ID: 15091330
A critical challenge in cloud computing is assuring confidentiality and integrity for the execution of arbitrary software in a…
Expand
2012
2012
Secure Networking for Virtual Machines in the Cloud
Miika Komu
,
Mohit Sethi
,
Ramasivakarthik Mallavarapu
,
Heikki Oirola
,
R. Khan
,
Sasu Tarkoma
IEEE International Conference on Cluster…
2012
Corpus ID: 15196586
Cloud computing improves utilization and flexibility of allocating computing resources while reducing the infrastructural costs…
Expand
Highly Cited
2010
Highly Cited
2010
Image Distribution Mechanisms in Large Scale Cloud Providers
R. Wartel
,
T. Cass
,
+4 authors
U. Schwickerath
IEEE Second International Conference on Cloud…
2010
Corpus ID: 14926211
This paper presents the various mechanisms for virtual machine image distribution within a large batch farm and between sites…
Expand
Review
2010
Review
2010
Smart phone based medicine in-take scheduler, reminder and monitor
J. Zao
,
Mei-Ying Wang
,
P. Tsai
,
J. W. Liu
The 12th IEEE International Conference on e…
2010
Corpus ID: 8482486
Out-patient medication administration was identified as the most error-prone procedure in modern healthcare. Most medication…
Expand
2010
2010
Task-aware based co-scheduling for virtual machine system
Yuebin Bai
,
Cong Xu
,
Zhi Li
ACM Symposium on Applied Computing
2010
Corpus ID: 18211879
Today, virtualization technique is increasingly mature and prevalent in server consolidation and HPC. Virtual machine monitor…
Expand
Review
2008
Review
2008
System-Level Virtualization for High Performance Computing
Geoffroy R. Vallée
,
T. Naughton
,
C. Engelmann
,
H. Ong
,
S. Scott
International Euromicro Conference on Parallel…
2008
Corpus ID: 2172877
System-level virtualization has been a research topic since the 70's but regained popularity during the past few years because of…
Expand
2002
2002
Remote attack detection method in IDA: MLSI-based intrusion detection using discriminant analysis
Midori Asaka
,
Takefumi Onabuta
,
T. Inoue
,
Shigeki Goto
International Symposium on Applications and the…
2002
Corpus ID: 17906253
In order to detect intrusions, IDA (Intrusion Detection Agent system) initially monitors system logs in order to discover an MLSI…
Expand
Highly Cited
1999
Highly Cited
1999
Cameron: high level language compilation for reconfigurable systems
J. Hammes
,
Bob Rinker
,
W. Bohm
,
W. Najjar
,
B. Draper
,
R. Beveridge
International Conference on Parallel…
1999
Corpus ID: 2528806
This paper presents the Cameron Project, which aims to provide a high level, algorithmic language and optimizing compiler for the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE