Embedded hypervisor

Results: 64



#Item
1Press Release One in Five Embedded Projects Now Integrating Virtualization, According to New Report by VDC Security concerns are at the forefront as IoT connectivity comes to an increasing share of the world’s lifecrit

Press Release One in Five Embedded Projects Now Integrating Virtualization, According to New Report by VDC Security concerns are at the forefront as IoT connectivity comes to an increasing share of the world’s lifecrit

Add to Reading List

Source URL: www.vdcresearch.com

Language: English - Date: 2016-03-03 10:07:17
2Microsoft Word - Weber_Weber_Virtualisation_English

Microsoft Word - Weber_Weber_Virtualisation_English

Add to Reading List

Source URL: www.itas.kit.edu

Language: English - Date: 2013-09-06 09:56:55
3White Paper∗ Protecting e-Government Against Attacks Gernot Heiser University of New South Wales Sydney, Australia

White Paper∗ Protecting e-Government Against Attacks Gernot Heiser University of New South Wales Sydney, Australia

Add to Reading List

Source URL: www.itas.kit.edu

Language: English - Date: 2013-09-10 11:50:52
4Definable functions continuous on curves in o-minimal structures

Definable functions continuous on curves in o-minimal structures

Add to Reading List

Source URL: www.inesc-id.pt

Language: English - Date: 2016-03-04 03:54:11
5VirtualPower: Coordinated Power Management in Virtualized Enterprise Systems Ripal Nathuji Karsten Schwan

VirtualPower: Coordinated Power Management in Virtualized Enterprise Systems Ripal Nathuji Karsten Schwan

Add to Reading List

Source URL: www.sosp2007.org

Language: English - Date: 2016-06-15 13:09:51
6Architecture Support for Guest-Transparent VM Protection from Untrusted Hypervisor and Physical Attacks∗ Yubin Xia, Yutao Liu, Haibo Chen Institute of Parallel and Distributed Systems, Shanghai Jiao Tong University {xi

Architecture Support for Guest-Transparent VM Protection from Untrusted Hypervisor and Physical Attacks∗ Yubin Xia, Yutao Liu, Haibo Chen Institute of Parallel and Distributed Systems, Shanghai Jiao Tong University {xi

Add to Reading List

Source URL: ipads.se.sjtu.edu.cn

Language: English - Date: 2013-02-06 17:26:37
7RT-­‐Xen:	
  Real-­‐Time	
  Virtualiza2on	
   from	
  embedded	
  to	
  cloud	
  compu2ng	
   Chenyang	
  Lu	
   Cyber-­‐Physical	
  Systems	
  Laboratory	
   Department	
  of	
  Computer	
  Scie

RT-­‐Xen:  Real-­‐Time  Virtualiza2on   from  embedded  to  cloud  compu2ng   Chenyang  Lu   Cyber-­‐Physical  Systems  Laboratory   Department  of  Computer  Scie

Add to Reading List

Source URL: www.cse.wustl.edu

Language: English - Date: 2014-06-05 15:13:20
8Machine Virtualization for Fun, Profit, and Security  Muli Ben-Yehuda (Technion & IBM Research) Muli Ben-Yehuda Technion & IBM Research

Machine Virtualization for Fun, Profit, and Security Muli Ben-Yehuda (Technion & IBM Research) Muli Ben-Yehuda Technion & IBM Research

Add to Reading List

Source URL: www.mulix.org

Language: English - Date: 2016-06-16 09:04:11
9Reducing World Switches in Virtualized Environment with Flexible Cross-world Calls Wenhao Li, Yubin Xia, Haibo Chen, Binyu Zang, Haibing Guan Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong U

Reducing World Switches in Virtualized Environment with Flexible Cross-world Calls Wenhao Li, Yubin Xia, Haibo Chen, Binyu Zang, Haibing Guan Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong U

Add to Reading List

Source URL: ipads.se.sjtu.edu.cn

Language: English - Date: 2015-08-10 02:20:31
10Breaking Up is Hard to Do: Security and Functionality in a Commodity Hypervisor Patrick Colp†, Mihir Nanavati†, Jun Zhu‡, William Aiello†, George Coker∗, Tim Deegan‡, Peter Loscocco∗, and Andrew Warfield†

Breaking Up is Hard to Do: Security and Functionality in a Commodity Hypervisor Patrick Colp†, Mihir Nanavati†, Jun Zhu‡, William Aiello†, George Coker∗, Tim Deegan‡, Peter Loscocco∗, and Andrew Warfield†

Add to Reading List

Source URL: tjd.phlegethon.org

Language: English - Date: 2011-09-08 23:06:55