The design of the Venus operating system
Communications of the ACM
A hardware architecture for implementing protection rings
Communications of the ACM
Coupling virtual machines and system construction
Proceedings of the workshop on virtual computer systems
A recursive virtual machine architecture
Proceedings of the workshop on virtual computer systems
VHM : a Virtual Hardware Monitor
Proceedings of the workshop on virtual computer systems
Virtual machines and data security
Proceedings of the workshop on virtual computer systems
Proceedings of the workshop on virtual computer systems
Performance of the GE-645 associative memory while Multics is in operation
Proceedings of the SIGOPS workshop on System performance evaluation
A program simulator by partial interpretation
SOSP '69 Proceedings of the second symposium on Operating systems principles
The evolution of virtual machine architecture
AFIPS '73 Proceedings of the June 4-8, 1973, national computer conference and exposition
An efficient virtual machine implementation
AFIPS '73 Proceedings of the June 4-8, 1973, national computer conference and exposition
Cross-Platform Software Reuse by Functional Integration Approach
COMPSAC '97 Proceedings of the 21st International Computer Software and Applications Conference
Software debugging: the virtual machine approach
ACM '74 Proceedings of the 1974 annual ACM conference - Volume 2
The evolution of virtual machine architecture
AFIPS '73 Proceedings of the June 4-8, 1973, national computer conference and exposition
Verifiable secure operating system software
AFIPS '74 Proceedings of the May 6-10, 1974, national computer conference and exposition
AFIPS '74 Proceedings of the May 6-10, 1974, national computer conference and exposition
Analysis of virtual machine system policies
Proceedings of the 14th ACM symposium on Access control models and technologies
Refinement Proposal of the Goldberg's Theory
ICA3PP '09 Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing
A compositional multiple policies operating system security model
WISA'07 Proceedings of the 8th international conference on Information security applications
The performance analysis for virtualisation cluster and cloud platforms
International Journal of Computational Science and Engineering
Hi-index | 0.00 |
Virtual machine (VM) systems are a major development in computer systems design. By providing an efficient facsimile of one or more complete computer systems, virtual machines have extended the multi-access, multi-programming, multi-processing systems of the past decade to be multi-environment systems as well. Thus, many of the advantages in ease of system use previously enjoyed only by application programmers have been made available to systems programmers.