z/VM

Known as: VM/XA, VM-CP, VM/CMS minidisk 
VM (often: VM/CMS) is a family of IBM virtual machine operating systems used on IBM mainframes System/370, System/390, zSeries, System z and… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
One of many advantages of the cloud is the elasticity, the ability to dynamically acquire or release computing resources in… (More)
  • table I
  • table II
  • figure 4
  • figure 2
  • figure 6
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Today's data centers need efficient traffic management to improve resource utilization in their networks. In this work, we study… (More)
  • figure 1
  • table I
  • figure 2
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Resource provisioning in compute clouds often require an estimate of the capacity needs of Virtual Machines (VMs). The estimated… (More)
  • figure 1
  • figure 3
  • figure 5
  • figure 6
  • figure 7
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Server consolidation using virtualization technology has become increasingly important for improving data center efficiency. It… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2010
Highly Cited
2010
With the ability to move virtual machines between physical hosts, live migration is a core feature of virtualisation. However for… (More)
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Software evolves to fix bugs and add features. Stopping and restarting programs to apply changes is inconvenient and often costly… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • table 1
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Live migration of virtual machines has been a powerful tool to facilitate system maintenance, load balancing, fault tolerance… (More)
  • figure 1
  • table I
  • figure 2
  • figure 4
  • figure 3
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Host-based security tools such as anti-virus and intrusion detection systems are not adequately protected on today's computers… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We present the design and implementation of a system that enables trusted computing for an unlimited number of virtual machines… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
This paper describes a toolkit for semi-automatically measuring and modeling static and dynamic characteristics of applications… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?