Academic literature on the topic 'Hypervisor'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Hypervisor.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Hypervisor"
Shetty, Jyoti, Sahana Upadhaya, Rajarajeshwari H S, Shobha G, and Jayant Chandra. "An Empirical Performance Evaluation of Docker Container, Openstack Virtual Machine and Bare Metal Server." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 1 (July 1, 2017): 205. http://dx.doi.org/10.11591/ijeecs.v7.i1.pp205-213.
Full textBarrowclough, John Patrick, and Rameez Asif. "Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures." Security and Communication Networks 2018 (June 11, 2018): 1–20. http://dx.doi.org/10.1155/2018/1681908.
Full textBoberić, Milan. "JEDNO OD REŠENJA ZA PARTICIONISANJE CENTRALNE PROCESORSKE JEDINICE SA VIŠE JEZGARA." Zbornik radova Fakulteta tehničkih nauka u Novom Sadu 34, no. 04 (March 22, 2019): 781–84. http://dx.doi.org/10.24867/02ih07boberic.
Full textKashyap, Rekha, and Deo Prakash Vidyarthi. "A Secured Real Time Scheduling Model for Cloud Hypervisor." International Journal of Cloud Applications and Computing 6, no. 4 (October 2016): 97–110. http://dx.doi.org/10.4018/ijcac.2016100106.
Full textFox, Dirk. "Hypervisor." Datenschutz und Datensicherheit - DuD 36, no. 1 (January 2012): 54. http://dx.doi.org/10.1007/s11623-012-0012-y.
Full textSilva, Daniel, Joao Rafael, and Alexandre Fonte. "Virtualization Maturity in Creating System VM: An Updated Performance Evaluation." International Journal of Electrical and Computer Engineering Research 3, no. 2 (June 15, 2023): 7–17. http://dx.doi.org/10.53375/ijecer.2023.341.
Full textPatange, Pritam. "Virtual Disks Performance Analysis Using Flexible I/O and Powerstat." International Journal for Research in Applied Science and Engineering Technology 9, no. 10 (October 31, 2021): 267–96. http://dx.doi.org/10.22214/ijraset.2021.38392.
Full textDoğan, Atakan, and Kemal Ebcioğlu. "Cloud Building Block Chip for Creating FPGA and ASIC Clouds." ACM Transactions on Reconfigurable Technology and Systems 15, no. 2 (June 30, 2022): 1–35. http://dx.doi.org/10.1145/3466822.
Full textCaturiyanto, Totok Wahyu, Arief Setyanto, and Eko Pramono. "Analisa Dan Perbandingan Performa Hypervisor ESXi, XEN, VMWARE Workstation Pro, Dan Virtualbox." Jurnal Informa : Jurnal Penelitian dan Pengabdian Masyarakat 6, no. 2 (December 15, 2020): 40–44. http://dx.doi.org/10.46808/informa.v6i2.182.
Full textPerneel, L., H. Fayyad-Kazan, L. Peng, F. Guan, and M. Timmerman. "Business Hypervisors for Real-time Applications." Engineering, Technology & Applied Science Research 5, no. 4 (August 17, 2015): 832–40. http://dx.doi.org/10.48084/etasr.568.
Full textDissertations / Theses on the topic "Hypervisor"
Cardace, Antonio. "UMView, a Userspace Hypervisor Implementation." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/13184/.
Full textKlemperer, Peter Friedrich. "Efficient Hypervisor Based Malware Detection." Research Showcase @ CMU, 2014. http://repository.cmu.edu/dissertations/466.
Full textMcAdams, Sean. "Virtualization Components of the Modern Hypervisor." UNF Digital Commons, 2015. http://digitalcommons.unf.edu/etd/599.
Full textShah, Tawfiq M. "Radium: Secure Policy Engine in Hypervisor." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc804971/.
Full textÖzcan, Mehmet Batuhan, and Gabriel Iro. "PARAVIRTUALIZATION IMPLEMENTATION IN UBUNTU WITH XEN HYPERVISOR." Thesis, Blekinge Tekniska Högskola, Institutionen för kommunikationssystem, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2011.
Full textSuryanarayana, Vidya. "Impact of hypervisor cache locking on performance." Diss., Wichita State University, 2013. http://hdl.handle.net/10057/10616.
Full textThesis (Ph.D.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and Computer Science
Chan, Lawrence L. "Modeling virtualized application performance from hypervisor counters." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/66404.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 61-64).
Managing a virtualized datacenter has grown more challenging, as each virtual machine's service level agreement (SLA) must be satisfied, when the service levels are generally inaccessible to the hypervisor. To aid in VM consolidation and service level assurance, we develop a modeling technique that generates accurate models of service level. Using only hypervisor counters as inputs, we train models to predict application response times and predict SLA violations. To collect training data, we conduct a simulation phase which stresses the application across many workloads levels, and collects each response time. Simultaneously, hypervisor performance counters are collected. Afterwards, the data is synchronized and used as training data in ensemble-based genetic programming for symbolic regression. This modeling technique is quite efficient at dealing with high-dimensional datasets, and it also generates interpretable models. After training models for web servers and virtual desktops, we test generalization across different content. In our experiments, we found that our technique could distill small subsets of important hypervisor counters from over 700 counters. This was tested for both Apache web servers and Windows-based virtual desktop infrastructures. For the web servers, we accurately modeled the breakdown points and also the service levels. Our models could predict service levels with 90.5% accuracy on a test set. On a untrained scenario with completely different contending content, our models predict service levels with 70% accuracy, but predict SLA violation with 92.7% accuracy. For the virtual desktops, on test scenarios similar to training scenarios, model accuracy was 97.6%. Our main contribution is demonstrating that a completely data-driven approach to application performance modeling can be successful. In contrast to many other works, our models do not use workload level or response times as inputs to the models, but nevertheless predicts service level accurately. Our approach also lets the models determine which inputs are important to a particular model's performance, rather than hand choosing a few inputs to train on.
by Lawrence L. Chan.
M.Eng.
Govindharajan, Hariprasad. "Porting Linux to a Hypervisor Based Embedded System." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-205568.
Full textDouglas, Heradon. "Thin Hypervisor-Based Security Architectures for Embedded Platforms." Thesis, SICS, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-23667.
Full textSVAMP
Rybák, Martin. "Konsolidace serverů za použití virtualizace." Master's thesis, Vysoká škola ekonomická v Praze, 2007. http://www.nusl.cz/ntk/nusl-77173.
Full textBooks on the topic "Hypervisor"
Chisnall, David. The definitive guide to the Xen hypervisor. Upper Saddle River, NJ: Prentice Hall, 2008.
Find full textLi, Shih-Wei. A Secure and Formally Verified Commodity Multiprocessor Hypervisor. [New York, N.Y.?]: [publisher not identified], 2021.
Find full text1977-, Sterling Mike, and Stewart Allen 1969-, eds. Windows server 2008 Hyper-V: Insiders guide to Microsoft's Hypervisor. Indianapolis, Ind: Wiley Pub., 2009.
Find full textKelbley, John. Windows server 2008 R2 Hyper-V: Insiders guide to Microsoft's Hypervisor. Indianapolis: Wiley Technology Pub., 2010.
Find full text1977-, Sterling Mike, ed. Windows server 2008 R2 Hyper-V: Insiders guide to Microsoft's Hypervisor. Hoboken, NJ: Wiley, 2010.
Find full textXen Virtualization: A fast and practical guide to supporting multiple operating systems with the Xen Hypervisor. Birmingham: Packt Publishing, Limited, 2007.
Find full textBlokdyk, Gerardus. Embedded Hypervisor a Complete Guide - 2020 Edition. Emereo Pty Limited, 2020.
Find full textBook chapters on the topic "Hypervisor"
Zaidenberg, Nezer Jacob, Michael Kiperberg, Raz Ben Yehuda, Roee Leon, Asaf Algawi, and Amit Resh. "Hypervisor Memory Introspection and Hypervisor Based Malware Honeypot." In Communications in Computer and Information Science, 317–34. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-49443-8_15.
Full textGraziano, Mariano, Andrea Lanzi, and Davide Balzarotti. "Hypervisor Memory Forensics." In Research in Attacks, Intrusions, and Defenses, 21–40. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41284-4_2.
Full textVasudevan, Amit. "Micro-Hypervisor Applications." In Practical Security Properties on Commodity Computing Platforms, 73–85. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25049-2_4.
Full textBarrett/Norris, Kenneth/Stephen. "Building the Hypervisor Host." In Running Mainframe z on Distributed Platforms, 31–51. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6431-6_3.
Full textCohen, Ernie. "Validating the Microsoft Hypervisor." In FM 2006: Formal Methods, 81. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11813040_6.
Full textMishra, Anand Kumar, Mahesh Govil, and Emmanuel Pilli. "A Taxonomy of Hypervisor Forensic Tools." In Advances in Digital Forensics XVI, 181–99. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-56223-6_10.
Full textAlkassar, Eyad, Mark A. Hillebrand, Wolfgang Paul, and Elena Petrova. "Automated Verification of a Small Hypervisor." In Verified Software: Theories, Tools, Experiments, 40–54. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15057-9_3.
Full textCohen, Ernie, Wolfgang Paul, and Sabine Schmaltz. "Theory of Multi Core Hypervisor Verification." In Lecture Notes in Computer Science, 1–27. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35843-2_1.
Full textMutch, John, and Brian Anderson. "Protecting Virtual Environments from Hypervisor Sabotage." In Preventing Good People from doing Bad Things, 97–111. Berkeley, CA: Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3922-2_6.
Full textTatashin, Pavel, and William Moloney. "Seamless Update of a Hypervisor Stack." In Lecture Notes in Networks and Systems, 509–19. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-80119-9_31.
Full textConference papers on the topic "Hypervisor"
Silva, Otávio A. A., and Paulo Lício de Geus. "Lokke, a hybrid security hypervisor." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbseg.2020.19238.
Full textFerruzzi, Adriano José, Christian Esteve Rothenberg, and Leandro Martinez. "Análise do Comportamento de Aplicações Paralelas em Ambientes de Computação de Alto Desempenho Virtualizados." In XVIII Workshop em Clouds e Aplicações. Sociedade Brasileira de Computação, 2020. http://dx.doi.org/10.5753/wcga.2020.12444.
Full textMyren, Jason, and Mitch Groen. "Architecture And Application Of Hypervisor In FACE Environment With Safety Assurance." In Vertical Flight Society 76th Annual Forum & Technology Display. The Vertical Flight Society, 2020. http://dx.doi.org/10.4050/f-0076-2020-16427.
Full textSartakov, Vasily A., and Rudiger Kapitza. "NV-Hypervisor: Hypervisor-Based Persistence for Virtual Machines." In 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2014. http://dx.doi.org/10.1109/dsn.2014.64.
Full textVanderLeest, Steven H. "ARINC 653 hypervisor." In 2010 IEEE/AIAA 29th Digital Avionics Systems Conference (DASC). IEEE, 2010. http://dx.doi.org/10.1109/dasc.2010.5655298.
Full textNaughton, Thomas, Geoffroy Vallee, Stephen L. Scott, and Ferrol Aderholdt. "Loadable Hypervisor Modules." In 2010 43rd Hawaii International Conference on System Sciences. IEEE, 2010. http://dx.doi.org/10.1109/hicss.2010.258.
Full textDubrulle, P., R. Sirdey, P. Dore, M. Aichouch, and E. Ohayon. "Blind hypervision to protect virtual machine privacy against hypervisor escape vulnerabilities." In 2015 IEEE 13th International Conference on Industrial Informatics (INDIN). IEEE, 2015. http://dx.doi.org/10.1109/indin.2015.7281938.
Full text"Extending Hypervisor Architecture to Allow One Way Data Transfers from VMs to Hypervisors." In 4th International Conference on Cloud Computing and Services Science. SCITEPRESS - Science and and Technology Publications, 2014. http://dx.doi.org/10.5220/0004958006040609.
Full textThongthua, Ammarit, and Sudsanguan Ngamsuriyaroj. "Assessment of Hypervisor Vulnerabilities." In 2016 International Conference on Cloud Computing Research and Innovations (ICCCRI). IEEE, 2016. http://dx.doi.org/10.1109/icccri.2016.19.
Full textGantet, Anais. "CrashOS: Hypervisor Testing Tool." In 2017 IEEE 28th International Symposium on Software Reliability Engineering: Workshops (ISSREW). IEEE, 2017. http://dx.doi.org/10.1109/issrew.2017.34.
Full textReports on the topic "Hypervisor"
Chandramouli, Ramaswamy. Security recommendations for hypervisor deployment on servers. Gaithersburg, MD: National Institute of Standards and Technology, January 2018. http://dx.doi.org/10.6028/nist.sp.800-125a.
Full textChandramouli, Ramaswamy. Security recommendations for server-based hypervisor platforms. Gaithersburg, MD: National Institute of Standards and Technology, June 2018. http://dx.doi.org/10.6028/nist.sp.800-125ar1.
Full textVasudevan, Amit, Jonathan M. McCune, and James Newsome. It's an app. It's a hypervisor. It's a hypapp. : Design and Implementation of an eXtensible and Modular Hypervisor Framework. Fort Belvoir, VA: Defense Technical Information Center, June 2012. http://dx.doi.org/10.21236/ada579935.
Full textChandramouli, Ramaswamy, Anoop Singhal, Duminda Wijesekera, and Changwei Liu. Methodology for enabling forensic analysis using hypervisor vulnerabilities data. Gaithersburg, MD: National Institute of Standards and Technology, June 2019. http://dx.doi.org/10.6028/nist.ir.8221.
Full textChaki, Sagar, Amit Vasudevan, Limin Jia, Jonathan McCune, and Anupam Datta. Design, Development, and Automated Verification of an Integrity-Protected Hypervisor. Fort Belvoir, VA: Defense Technical Information Center, July 2012. http://dx.doi.org/10.21236/ada579386.
Full textAsai, H., M. MacFaden, J. Schoenwaelder, K. Shima, and T. Tsou. Management Information Base for Virtual Machines Controlled by a Hypervisor. RFC Editor, October 2015. http://dx.doi.org/10.17487/rfc7666.
Full textMitchum, Terrence, Kent Larson, Raymond Lu, Brian Loe, and Dick O'Brien. Hypervisors for Security and Robustness. Fort Belvoir, VA: Defense Technical Information Center, February 1999. http://dx.doi.org/10.21236/ada360460.
Full textZaharia, Matei, Sachin Katti, Chris Grier, Vern Paxson, Scott Shenker, Ion Stoica, and Dawn Song. Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research Community. Fort Belvoir, VA: Defense Technical Information Center, January 2012. http://dx.doi.org/10.21236/ada555877.
Full text