1989
DOI: 10.1147/sj.281.0104
|View full text |Cite
|
Sign up to set email alerts
|

Multiple operating systems on one processor complex

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2005
2005
2014
2014

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 47 publications
(18 citation statements)
references
References 2 publications
0
17
0
Order By: Relevance
“…We assume that the data center is based on logical partitioning [23], i.e., the underlying physical resources are timemultiplexed between different VMs, and time is partitioned into slots of equal length. We denote the computing resource demand of a VN v at time t by R(v, t), and assume it is the probabilistic combination of three parts: a basic part R 0 (v, t), which exists throughout the lifetime of the VN, and two variable parts R 1 (v, t) and R 2 (v, t), which occur with probabilities of p v 1 and p v 2 , respectively, i.e., R 1 (v, t) and Fig.…”
Section: A Probabilistic Combination As Resource Demandmentioning
confidence: 99%
“…We assume that the data center is based on logical partitioning [23], i.e., the underlying physical resources are timemultiplexed between different VMs, and time is partitioned into slots of equal length. We denote the computing resource demand of a VN v at time t by R(v, t), and assume it is the probabilistic combination of three parts: a basic part R 0 (v, t), which exists throughout the lifetime of the VN, and two variable parts R 1 (v, t) and R 2 (v, t), which occur with probabilities of p v 1 and p v 2 , respectively, i.e., R 1 (v, t) and Fig.…”
Section: A Probabilistic Combination As Resource Demandmentioning
confidence: 99%
“…OSs on a physical machine [10]. Each OS executes in an isolated virtual machine (VM), observing a hardware interface that is usually identical to the underlying hardware interface [81].…”
Section: Virtualizationmentioning
confidence: 99%
“…Various virtual machine monitor approaches have been suggested [14,42,7] for supporting COTS applications while reliably separating different domains of data. In general, for these approaches to be trustworthy requires both the use of strictly virtualizable hardware [29], and a trustworthy monitor mechanism for separating the activities of the virtual machines.…”
Section: Related Workmentioning
confidence: 99%