Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,277,657 papers from all fields of science
Search
Sign In
Create Free Account
Hypervisor
Known as:
Host Machine
, Hypervisors
, Hyper visor
Expand
A hypervisor or virtual machine monitor (VMM) is a piece of computer software, firmware or hardware that creates and runs virtual machines. A…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
"Classic" Mac OS
ARM architecture
Adeos
Bare machine
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
A Survey of Mobile Device Virtualization
Junaid Shuja
,
A. Gani
,
+4 authors
Albert Y. Zomaya
ACM Computing Surveys
2016
Corpus ID: 10389838
Recent growth in the processing and memory resources of mobile devices has fueled research within the field of mobile…
Expand
Highly Cited
2015
Highly Cited
2015
Hypervisors vs. Lightweight Virtualization: A Performance Comparison
Roberto Morabito
,
Jimmy Kjällman
,
Miika Komu
IEEE International Conference on Consumer…
2015
Corpus ID: 1513513
Virtualization of operating systems provides a common way to run different services in the cloud. Recently, the lightweight…
Expand
Highly Cited
2014
Highly Cited
2014
Hypervisor-based cloud intrusion detection system
Jason Nikolai
,
Yong Wang
International Conference on Computing, Networking…
2014
Corpus ID: 13283156
Shared resources are an essential part of cloud computing. Virtualization and multi-tenancy provide a number of advantages for…
Expand
Highly Cited
2013
Highly Cited
2013
Characterizing hypervisor vulnerabilities in cloud computing servers
Diego Perez-Botero
,
Jakub Szefer
,
R. Lee
Cloud Computing
2013
Corpus ID: 6909552
The rise of the Cloud Computing paradigm has led to security concerns, taking into account that resources are shared and mediated…
Expand
Highly Cited
2011
Highly Cited
2011
Analysis of Virtualization Technologies for High Performance Computing Environments
A. Younge
,
R. Henschel
,
James T. Brown
,
G. Laszewski
,
J. Qiu
,
G. Fox
IEEE International Conference on Cloud Computing
2011
Corpus ID: 13357615
As Cloud computing emerges as a dominant paradigm in distributed systems, it is important to fully understand the underlying…
Expand
Highly Cited
2007
Highly Cited
2007
QoS policies and architecture for cache/memory in CMP platforms
R. Iyer
,
Li Zhao
,
+6 authors
S. Reinhardt
Measurement and Modeling of Computer Systems
2007
Corpus ID: 13014348
As we enter the era of CMP platforms with multiple threads/cores on the die, the diversity of the simultaneous workloads running…
Expand
Review
2007
Review
2007
Compatibility Is Not Transparency: VMM Detection Myths and Realities
Tal Garfinkel
,
Keith Adams
,
A. Warfield
,
Jason Franklin
USENIX Workshop on Hot Topics in Operating…
2007
Corpus ID: 2768904
Recent work on applications ranging from realistic honeypots to stealthier rootkits has speculated about building transparent…
Expand
Highly Cited
2006
Highly Cited
2006
A case for high performance computing with virtual machines
Wei Huang
,
Jiuxing Liu
,
B. Abali
,
D. Panda
International Conference on Supercomputing
2006
Corpus ID: 6910735
Virtual machine (VM) technologies are experiencing a resurgence in both industry and research communities. VMs offer many…
Expand
Highly Cited
2005
Highly Cited
2005
Building a MAC-based security architecture for the Xen open-source hypervisor
R. Sailer
,
T. Jaeger
,
+5 authors
L. V. Doorn
Asia-Pacific Computer Systems Architecture…
2005
Corpus ID: 8766452
We present the sHype hypervisor security architecture and examine in detail its mandatory access control facilities. While…
Expand
Highly Cited
1997
Highly Cited
1997
Daisy: Dynamic Compilation For 10o?40 Architectural Compatibility
K. Ebcioglu
,
E. Altman
Conference Proceedings. The 24th Annual…
1997
Corpus ID: 14271662
Although VLIW architectures offer the advantages of simplicity of design and high issue rates, a major impediment to their use is…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required