Publisher
Springer Science and Business Media LLC
Subject
Computational Mathematics,Computational Theory and Mathematics,Computer Science Applications,Numerical Analysis,Theoretical Computer Science,Software
Reference56 articles.
1. Barham P, Dragovic B, Fraser K, Hand S, Harris T, Ho A, Neugebauer R, Pratt I, Warfield A (2003) Xen and the art of virtualization. In: ACM SIGOPS operating systems review, vol 37. ACM, pp 164–177
2. Zhang R, Su X, Wang J, Wang C, Liu W, Lau RWH (2015) On mitigating the risk of cross-vm covert channels in a public cloud. IEEE Trans Parallel Distrib Syst 26(8):2327–2339
3. Novakovic D, Vasic N, Novakovic S, Kostic D, Bianchini R (2013) Deepdive: transparently identifying and managing performance interference in virtualized environments. In: Proceedings of the 2013 USENIX annual technical conference, number EPFL-CONF-185984
4. Govindan S, Liu J, Kansal A, Sivasubramaniam A (2011) Cuanta: quantifying effects of shared on-chip resource interference for consolidated virtual machines. In: Proceedings of the 2nd ACM symposium on cloud computing. ACM
5. Dean J, Ghemawat S (2008) Mapreduce: simplified data processing on large clusters. Commun ACM 51(1):107–113
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献