-
1
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds," in ACM CCS, 2009.
-
(2009)
ACM Ccs
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
3
-
-
33845867538
-
Xen and the art of virtualization
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield, "Xen and the art of virtualization," in ACM SOSP, 2003.
-
(2003)
ACM SOSP
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
4
-
-
80054998597
-
A randomized sampling clock for cpu utilization estimation and code profiling
-
S. McCanne and C. Torek, "A randomized sampling clock for cpu utilization estimation and code profiling," in USENIX, 1993.
-
(1993)
USENIX
-
-
McCanne, S.1
Torek, C.2
-
8
-
-
80055004265
-
Novell, microsoft outline virtual collaboration
-
C. Boulton, "Novell, Microsoft Outline Virtual Collaboration," Serverwatch, 2007.
-
(2007)
Serverwatch
-
-
Boulton, C.1
-
10
-
-
84976823759
-
Dhrystone benchmark: Rationale for version 2 and measurement rules
-
R. P. Weicker, "Dhrystone Benchmark: Rationale for Version 2 and Measurement Rules," SIGPLAN Notices, 1988.
-
(1988)
SIGPLAN Notices
-
-
Weicker, R.P.1
-
12
-
-
80054972676
-
Task-aware virtual machine scheduling for I/O performance
-
H. Kim, H. Lim, J. Jeong, H. Jo, and J. Lee, "Task-aware virtual machine scheduling for I/O performance," in ACM VEE), 2009.
-
(2009)
ACM VEE
-
-
Kim, H.1
Lim, H.2
Jeong, J.3
Jo, H.4
Lee, J.5
-
14
-
-
80053134453
-
Vulnerability seen in amazon's cloud computing
-
October
-
D. Talbot, "Vulnerability seen in amazon's cloud computing," MIT Tech Review, October 2009.
-
(2009)
MIT Tech Review
-
-
Talbot, D.1
-
15
-
-
80054972362
-
Scheduler vulnerabilities and coordinated attacks in cloud computing
-
F. Zhou, M. Goel, P. Desnoyers, and R. Sundaram, "Scheduler vulnerabilities and coordinated attacks in cloud computing," in Northeastern Technical Report, 2010.
-
(2010)
Northeastern Technical Report
-
-
Zhou, F.1
Goel, M.2
Desnoyers, P.3
Sundaram, R.4
-
17
-
-
62449152759
-
Enforcing performance isolation across virtual machines in xen
-
D. Gupta, L. Cherkasova, R. Gardner, and A. Vahdat, "Enforcing performance isolation across virtual machines in Xen," in ACM/IFIP/USENIX Middleware, 2006.
-
(2006)
ACM/IFIP/USENIX Middleware
-
-
Gupta, D.1
Cherkasova, L.2
Gardner, R.3
Vahdat, A.4
-
18
-
-
80054976489
-
Xen and co.: Communication-aware cpu scheduling for consolidated xen-based hosting platforms
-
S. Govindan, A. Nath, A. Das, B. Urgaonkar, and A. Sivasubramaniam, "Xen and co.: communication-aware cpu scheduling for consolidated xen-based hosting platforms," in ACM VEE, 2007.
-
(2007)
ACM VEE
-
-
Govindan, S.1
Nath, A.2
Das, A.3
Urgaonkar, B.4
Sivasubramaniam, A.5
-
19
-
-
80055014430
-
Scheduling I/O in a virtual machine monitor
-
D. Ongaro, A. L. Cox, and S. Rixner, "Scheduling I/O in a virtual machine monitor," in ACM VEE, 2008.
-
(2008)
ACM VEE
-
-
Ongaro, D.1
Cox, A.L.2
Rixner, S.3
-
20
-
-
74349131504
-
The hybrid scheduling framework for virtual machine systems
-
C. Weng, Z. Wang, M. Li, and X. Lu, "The hybrid scheduling framework for virtual machine systems," in ACM VEE, 2009.
-
(2009)
ACM VEE
-
-
Weng, C.1
Wang, Z.2
Li, M.3
Lu, X.4
-
21
-
-
70649101118
-
Measuring CPU overhead for I/O processing in the xen virtual machine monitor
-
L. Cherkasova and R. Gardner, "Measuring CPU overhead for I/O processing in the Xen virtual machine monitor," in USENIX, 2005.
-
(2005)
USENIX
-
-
Cherkasova, L.1
Gardner, R.2
-
22
-
-
57349155964
-
High performance VMM-bypass I/O in virtual machines
-
J. Liu, W. Huang, B. Abali, and D. K. Panda, "High performance VMM-bypass I/O in virtual machines," in USENIX, 2006.
-
(2006)
USENIX
-
-
Liu, J.1
Huang, W.2
Abali, B.3
Panda, D.K.4
-
23
-
-
34547699252
-
Concurrent direct network access for virtual machine monitors
-
P. Willmann, J. Shafer, D. Carr, A. Menon, S. Rixner, A. L. Cox, and W. Zwaenepoel, "Concurrent direct network access for virtual machine monitors," in 13th Int'l Symp. HPDC, 2007.
-
(2007)
13th Int'l Symp. HPDC
-
-
Willmann, P.1
Shafer, J.2
Carr, D.3
Menon, A.4
Rixner, S.5
Cox, A.L.6
Zwaenepoel, W.7
-
24
-
-
80054990013
-
Diagnosing performance overheads in the xen virtual machine environment
-
A. Menon, J. R. Santos, Y. Turner, G. J. Janakiraman, and W. Zwaenepoel, "Diagnosing performance overheads in the Xen virtual machine environment," in ACM VEE, 2005.
-
(2005)
ACM VEE
-
-
Menon, A.1
Santos, J.R.2
Turner, Y.3
Janakiraman, G.J.4
Zwaenepoel, W.5
-
25
-
-
34548078618
-
High performance and scalable I/O virtualization via self-virtualized devices
-
H. Raj and K. Schwan, "High performance and scalable I/O virtualization via self-virtualized devices," in 16th Int'l Symp. HPDC, 2007.
-
(2007)
16th Int'l Symp. HPDC
-
-
Raj, H.1
Schwan, K.2
-
27
-
-
80052376621
-
Improving xen security through disaggregation
-
D. G. Murray, G. Milos, and S. Hand, "Improving Xen security through disaggregation," in ACM VEE, 2008.
-
(2008)
ACM VEE
-
-
Murray, D.G.1
Milos, G.2
Hand, S.3
-
28
-
-
80054979403
-
Policy enforcement and compliance proofs for xen virtual machines
-
B. Jansen, H. V. Ramasamy, and M. Schunter, "Policy enforcement and compliance proofs for Xen virtual machines," in ACM VEE, 2008.
-
(2008)
ACM VEE
-
-
Jansen, B.1
Ramasamy, H.V.2
Schunter, M.3
-
29
-
-
0022037993
-
An asymptotically fast nonadaptive algorithm for conflict resolution in multiple-access channels
-
J. Komlós and A. G. Greenberg, "An asymptotically fast nonadaptive algorithm for conflict resolution in multiple-access channels," IEEE Transactions on Information Theory, vol. 31, no. 2, pp. 302-306, 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.2
, pp. 302-306
-
-
Komlós, J.1
Greenberg, A.G.2
-
30
-
-
0022092597
-
Lower bound on the time needed in the worst case to resolve conflicts deterministically in multiple access channels
-
DOI 10.1145/3828.214125
-
A. G. Greenberg and S. Winograd, "A lower bound on the time needed in the worst case to resolve conflicts deterministically in multiple access channels," J. ACM, vol. 32, no. 3, pp. 589-596, 1985. (Pubitemid 15507403)
-
(1985)
Journal of the ACM
, vol.32
, Issue.3
, pp. 589-596
-
-
Greenberg Albert, G.1
Winograd Shmuel2
-
31
-
-
0023331338
-
Estimating the multiplicities of conflicts to speed their resolution in multiple access channels
-
DOI 10.1145/23005.23006
-
A. G. Greenberg, P. Flajolet, and R. E. Ladner, "Estimating the multiplicities of conflicts to speed their resolution in multiple access channels," J. ACM, vol. 34, no. 2, pp. 289-325, 1987. (Pubitemid 17602849)
-
(1987)
Journal of the ACM
, vol.34
, Issue.2
, pp. 289-325
-
-
Greenberg Albert, G.1
Flajolet Philippe2
Ladner Richard, E.3
-
32
-
-
84890022849
-
Cybercrime's "access" and "authorization," in computer misuse statutes
-
O. Kerr, "Cybercrime's "access" and " authorization" in computer misuse statutes," NYU Law Review, 2003.
-
(2003)
NYU Law Review
-
-
Kerr, O.1
|