Academic literature on the topic 'Hypervizor hypervisor'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Hypervizor hypervisor.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Hypervizor hypervisor"
Shetty, Jyoti, Sahana Upadhaya, Rajarajeshwari H S, Shobha G, and Jayant Chandra. "An Empirical Performance Evaluation of Docker Container, Openstack Virtual Machine and Bare Metal Server." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 1 (2017): 205. http://dx.doi.org/10.11591/ijeecs.v7.i1.pp205-213.
Full textBoberić, Milan. "JEDNO OD REŠENJA ZA PARTICIONISANJE CENTRALNE PROCESORSKE JEDINICE SA VIŠE JEZGARA." Zbornik radova Fakulteta tehničkih nauka u Novom Sadu 34, no. 04 (2019): 781–84. http://dx.doi.org/10.24867/02ih07boberic.
Full textBarrowclough, John Patrick, and Rameez Asif. "Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures." Security and Communication Networks 2018 (June 11, 2018): 1–20. http://dx.doi.org/10.1155/2018/1681908.
Full textKashyap, Rekha, and Deo Prakash Vidyarthi. "A Secured Real Time Scheduling Model for Cloud Hypervisor." International Journal of Cloud Applications and Computing 6, no. 4 (2016): 97–110. http://dx.doi.org/10.4018/ijcac.2016100106.
Full textPerneel, L., H. Fayyad-Kazan, L. Peng, F. Guan, and M. Timmerman. "Business Hypervisors for Real-time Applications." Engineering, Technology & Applied Science Research 5, no. 4 (2015): 832–40. http://dx.doi.org/10.48084/etasr.568.
Full textZoughbi, Dina Mohsen, and Nitul Dutta. "Hypervisor Vulnerabilities and Some Defense Mechanisms, in Cloud Computing Environment." International Journal of Innovative Technology and Exploring Engineering 10, no. 2 (2020): 42–48. http://dx.doi.org/10.35940/ijitee.b8262.1210220.
Full textRong Chang, Bao, Hsiu-Fen Tsai, Chi-Ming Chen, and Chien-Feng Huang. "Analysis of virtualized cloud server together with shared storage and estimation of consolidation ratio and TCO/ROI." Engineering Computations 31, no. 8 (2014): 1746–60. http://dx.doi.org/10.1108/ec-11-2012-0295.
Full textAhuja, Sanjay P., and Suganya Sridharan. "Performance Evaluation of Hypervisors for Cloud Computing." International Journal of Cloud Applications and Computing 2, no. 3 (2012): 26–67. http://dx.doi.org/10.4018/ijcac.2012070102.
Full textFox, Dirk. "Hypervisor." Datenschutz und Datensicherheit - DuD 36, no. 1 (2012): 54. http://dx.doi.org/10.1007/s11623-012-0012-y.
Full textColafranceschi, Stefano, and Emanuele De Biase. "The Case for a Cost-Effective General-Purpose Computer Cluster for Small Colleges." International Journal of Emerging Technologies in Learning (iJET) 16, no. 04 (2021): 4. http://dx.doi.org/10.3991/ijet.v16i04.18837.
Full textDissertations / Theses on the topic "Hypervizor hypervisor"
Škultéty, Erik. "Aplikační rozhraní pro administraci projektu Libvirt." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-255346.
Full textRybák, Martin. "Konsolidace serverů za použití virtualizace." Master's thesis, Vysoká škola ekonomická v Praze, 2007. http://www.nusl.cz/ntk/nusl-77173.
Full textKrempa, Peter. "Analysis of Entropy Levels in the Entropy Pool of Random Number Generator." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2013. http://www.nusl.cz/ntk/nusl-236179.
Full textIsenstierna, Tobias, and Stefan Popovic. "Computer systems in airborne radar : Virtualization and load balancing of nodes." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18300.
Full textCardace, Antonio. "UMView, a Userspace Hypervisor Implementation." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/13184/.
Full textKlemperer, Peter Friedrich. "Efficient Hypervisor Based Malware Detection." Research Showcase @ CMU, 2014. http://repository.cmu.edu/dissertations/466.
Full textMcAdams, Sean. "Virtualization Components of the Modern Hypervisor." UNF Digital Commons, 2015. http://digitalcommons.unf.edu/etd/599.
Full textShah, Tawfiq M. "Radium: Secure Policy Engine in Hypervisor." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc804971/.
Full textSuryanarayana, Vidya. "Impact of hypervisor cache locking on performance." Diss., Wichita State University, 2013. http://hdl.handle.net/10057/10616.
Full textChan, Lawrence L. "Modeling virtualized application performance from hypervisor counters." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/66404.
Full textBooks on the topic "Hypervizor hypervisor"
1977-, Sterling Mike, and Stewart Allen 1969-, eds. Windows server 2008 Hyper-V: Insiders guide to Microsoft's Hypervisor. Wiley Pub., 2009.
Find full text1977-, Sterling Mike, ed. Windows server 2008 R2 Hyper-V: Insiders guide to Microsoft's Hypervisor. Wiley, 2010.
Find full textKelbley, John. Windows server 2008 R2 Hyper-V: Insiders guide to Microsoft's Hypervisor. Wiley Technology Pub., 2010.
Find full textXen Virtualization: A fast and practical guide to supporting multiple operating systems with the Xen Hypervisor. Packt Publishing, Limited, 2007.
Find full textBlokdyk, Gerardus. Embedded Hypervisor a Complete Guide - 2020 Edition. Emereo Pty Limited, 2020.
Find full textBook chapters on the topic "Hypervizor hypervisor"
Jain, Shashank Mohan. "Hypervisors." In Linux Containers and Virtualization. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6283-2_2.
Full textZaidenberg, Nezer Jacob, Michael Kiperberg, Raz Ben Yehuda, Roee Leon, Asaf Algawi, and Amit Resh. "Hypervisor Memory Introspection and Hypervisor Based Malware Honeypot." In Communications in Computer and Information Science. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-49443-8_15.
Full textVasudevan, Amit. "Micro-Hypervisor Applications." In Practical Security Properties on Commodity Computing Platforms. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25049-2_4.
Full textGraziano, Mariano, Andrea Lanzi, and Davide Balzarotti. "Hypervisor Memory Forensics." In Research in Attacks, Intrusions, and Defenses. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41284-4_2.
Full textCohen, Ernie. "Validating the Microsoft Hypervisor." In FM 2006: Formal Methods. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11813040_6.
Full textBarrett/Norris, Kenneth/Stephen. "Building the Hypervisor Host." In Running Mainframe z on Distributed Platforms. Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6431-6_3.
Full textBudianto, Enrico, Richard Chow, Jonathan Ding, and Michael McCool. "Language-Based Hypervisors." In Cryptology and Network Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-48965-0_52.
Full textVasudevan, Amit. "Micro-Hypervisors: What? Why?" In Practical Security Properties on Commodity Computing Platforms. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25049-2_1.
Full textAlkassar, Eyad, Mark A. Hillebrand, Wolfgang Paul, and Elena Petrova. "Automated Verification of a Small Hypervisor." In Verified Software: Theories, Tools, Experiments. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15057-9_3.
Full textMutch, John, and Brian Anderson. "Protecting Virtual Environments from Hypervisor Sabotage." In Preventing Good People from doing Bad Things. Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3922-2_6.
Full textConference papers on the topic "Hypervizor hypervisor"
Ferruzzi, Adriano José, Christian Esteve Rothenberg, and Leandro Martinez. "Análise do Comportamento de Aplicações Paralelas em Ambientes de Computação de Alto Desempenho Virtualizados." In XVIII Workshop em Clouds e Aplicações. Sociedade Brasileira de Computação, 2020. http://dx.doi.org/10.5753/wcga.2020.12444.
Full text"Extending Hypervisor Architecture to Allow One Way Data Transfers from VMs to Hypervisors." In 4th International Conference on Cloud Computing and Services Science. SCITEPRESS - Science and and Technology Publications, 2014. http://dx.doi.org/10.5220/0004958006040609.
Full textSartakov, Vasily A., and Rudiger Kapitza. "NV-Hypervisor: Hypervisor-Based Persistence for Virtual Machines." In 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2014. http://dx.doi.org/10.1109/dsn.2014.64.
Full textVanderLeest, Steven H. "ARINC 653 hypervisor." In 2010 IEEE/AIAA 29th Digital Avionics Systems Conference (DASC). IEEE, 2010. http://dx.doi.org/10.1109/dasc.2010.5655298.
Full textNaughton, Thomas, Geoffroy Vallee, Stephen L. Scott, and Ferrol Aderholdt. "Loadable Hypervisor Modules." In 2010 43rd Hawaii International Conference on System Sciences. IEEE, 2010. http://dx.doi.org/10.1109/hicss.2010.258.
Full textDubrulle, P., R. Sirdey, P. Dore, M. Aichouch, and E. Ohayon. "Blind hypervision to protect virtual machine privacy against hypervisor escape vulnerabilities." In 2015 IEEE 13th International Conference on Industrial Informatics (INDIN). IEEE, 2015. http://dx.doi.org/10.1109/indin.2015.7281938.
Full textGantet, Anais. "CrashOS: Hypervisor Testing Tool." In 2017 IEEE 28th International Symposium on Software Reliability Engineering: Workshops (ISSREW). IEEE, 2017. http://dx.doi.org/10.1109/issrew.2017.34.
Full textThongthua, Ammarit, and Sudsanguan Ngamsuriyaroj. "Assessment of Hypervisor Vulnerabilities." In 2016 International Conference on Cloud Computing Research and Innovations (ICCCRI). IEEE, 2016. http://dx.doi.org/10.1109/icccri.2016.19.
Full textOmote, Yushi, Yosuke Chubachi, Takahiro Shinagawa, Tomohiro Kitamura, Hideki Eiraku, and Katsuya Matsubara. "Hypervisor-based background encryption." In the 27th Annual ACM Symposium. ACM Press, 2012. http://dx.doi.org/10.1145/2245276.2232073.
Full textBressoud, T. C., and F. B. Schneider. "Hypervisor-based fault tolerance." In the fifteenth ACM symposium. ACM Press, 1995. http://dx.doi.org/10.1145/224056.224058.
Full textReports on the topic "Hypervizor hypervisor"
Chandramouli, Ramaswamy. Security recommendations for hypervisor deployment on servers. National Institute of Standards and Technology, 2018. http://dx.doi.org/10.6028/nist.sp.800-125a.
Full textChandramouli, Ramaswamy. Security recommendations for server-based hypervisor platforms. National Institute of Standards and Technology, 2018. http://dx.doi.org/10.6028/nist.sp.800-125ar1.
Full textMitchum, Terrence, Kent Larson, Raymond Lu, Brian Loe, and Dick O'Brien. Hypervisors for Security and Robustness. Defense Technical Information Center, 1999. http://dx.doi.org/10.21236/ada360460.
Full textVasudevan, Amit, Jonathan M. McCune, and James Newsome. It's an app. It's a hypervisor. It's a hypapp. : Design and Implementation of an eXtensible and Modular Hypervisor Framework. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada579935.
Full textChandramouli, Ramaswamy, Anoop Singhal, Duminda Wijesekera, and Changwei Liu. Methodology for enabling forensic analysis using hypervisor vulnerabilities data. National Institute of Standards and Technology, 2019. http://dx.doi.org/10.6028/nist.ir.8221.
Full textChaki, Sagar, Amit Vasudevan, Limin Jia, Jonathan McCune, and Anupam Datta. Design, Development, and Automated Verification of an Integrity-Protected Hypervisor. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada579386.
Full textAsai, H., M. MacFaden, J. Schoenwaelder, K. Shima, and T. Tsou. Management Information Base for Virtual Machines Controlled by a Hypervisor. RFC Editor, 2015. http://dx.doi.org/10.17487/rfc7666.
Full textZaharia, Matei, Sachin Katti, Chris Grier, et al. Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research Community. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada555877.
Full text