ACM Transactions on Computer Systems (TOCS)
IEEE Internet Computing
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
When Virtual Is Better Than Real
HOTOS '01 Proceedings of the Eighth Workshop on Hot Topics in Operating Systems
PDS: a virtual execution environment for software deployment
Proceedings of the 1st ACM/USENIX international conference on Virtual execution environments
Reincarnating PCs with portable SoulPads
Proceedings of the 3rd international conference on Mobile systems, applications, and services
Microsoft Windows Internals, Fourth Edition: Microsoft Windows Server(TM) 2003, Windows XP, and Windows 2000 (Pro-Developer)
A feather-weight virtual machine for windows applications
Proceedings of the 2nd international conference on Virtual execution environments
A comparison of software and hardware techniques for x86 virtualization
Proceedings of the 12th international conference on Architectural support for programming languages and operating systems
The collective: a cache-based system management architecture
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
Detours: binary interception of Win32 functions
WINSYM'99 Proceedings of the 3rd conference on USENIX Windows NT Symposium - Volume 3
OS circular: internet client for reference
LISA'07 Proceedings of the 21st conference on Large Installation System Administration Conference
Moobi: a thin server management system using BitTorrent
LISA'07 Proceedings of the 21st conference on Large Installation System Administration Conference
VMtorrent: virtual appliances on-demand
Proceedings of the ACM SIGCOMM 2010 conference
Automatic software deployment using user-level virtualization for cloud-computing
Future Generation Computer Systems
VMTorrent: scalable P2P virtual machine streaming
Proceedings of the 8th international conference on Emerging networking experiments and technologies
Hi-index | 0.00 |
System administrators are unique computer users. As power users in complex and high-risk work environments, intuition tells us that they may have requirements of the tools they use that differ from those of regular computer users. This paper presents ...