QEMU

Results: 434



#Item
11PORTING NEW CODE TO RISC-V WITH YOCTO/OPENEMBEDDED Martin Maas () 1st RISC-V Workshop, January 15, 2015 Monterey, CA

PORTING NEW CODE TO RISC-V WITH YOCTO/OPENEMBEDDED Martin Maas () 1st RISC-V Workshop, January 15, 2015 Monterey, CA

Add to Reading List

Source URL: riscv.org

Language: English - Date: 2016-04-09 11:41:57
12Decoupling Provenance Capture and Analysis from Execution Manolis Stamatogiannakis ∗ Paul Groth  Herbert Bos

Decoupling Provenance Capture and Analysis from Execution Manolis Stamatogiannakis ∗ Paul Groth Herbert Bos

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-21 06:43:09
13Virtualisation security and the Intel privilege model Tavis Ormandy, Julien Tinnes Google Inc.  Agenda

Virtualisation security and the Intel privilege model Tavis Ormandy, Julien Tinnes Google Inc. Agenda

Add to Reading List

Source URL: www.cr0.org

Language: English - Date: 2009-11-28 11:17:07
14ARM Virtualization: Performance and Architectural Implications

ARM Virtualization: Performance and Architectural Implications

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2016-07-02 09:59:49
15KVM, OpenStack and the Open Cloud SUSECon – November 2015 Adam Jollans Program Director, Linux & Open Virtualization Strategy

KVM, OpenStack and the Open Cloud SUSECon – November 2015 Adam Jollans Program Director, Linux & Open Virtualization Strategy

Add to Reading List

Source URL: www.susecon.com

Language: English - Date: 2015-11-20 11:21:14
16V-BOINC: The Virtualization of BOINC Gary A. McGilvary⇤ , Adam Barker† , Ashley Lloyd‡ and Malcolm Atkinson⇤ Data-Intensive Research Group, School of Informatics, The University of Edinburgh Email: gary.mcgilvary

V-BOINC: The Virtualization of BOINC Gary A. McGilvary⇤ , Adam Barker† , Ashley Lloyd‡ and Malcolm Atkinson⇤ Data-Intensive Research Group, School of Informatics, The University of Edinburgh Email: gary.mcgilvary

Add to Reading List

Source URL: www.adambarker.org

Language: English - Date: 2013-03-14 13:57:55
17RISC-V Software Ecosystem Andrew Waterman UC Berkeley !  Tethered vs. Standalone Systems

RISC-V Software Ecosystem Andrew Waterman UC Berkeley ! Tethered vs. Standalone Systems

Add to Reading List

Source URL: riscv.org

Language: English - Date: 2016-04-09 11:41:57
18Symbolic execution for BIOS security1 Oleksandr Bazhaniuk, John Loucaides, Lee Rosenbaum, Mark R. Tuttle, Vincent Zimmer2 Intel Corporation May 25, 2015 Abstract We are building a tool that uses symbolic execution to

Symbolic execution for BIOS security1 Oleksandr Bazhaniuk, John Loucaides, Lee Rosenbaum, Mark R. Tuttle, Vincent Zimmer2 Intel Corporation May 25, 2015 Abstract We are building a tool that uses symbolic execution to

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-21 20:25:08
19How To User Guides ReleaseJuly 28, 2016  CONTENTS

How To User Guides ReleaseJuly 28, 2016 CONTENTS

Add to Reading List

Source URL: fast.dpdk.org

Language: English - Date: 2016-07-28 16:30:34
20Patch Auditing in Infrastructure as a Service Clouds Lionel Litty ∗ David Lie  VMware, Inc.

Patch Auditing in Infrastructure as a Service Clouds Lionel Litty ∗ David Lie VMware, Inc.

Add to Reading List

Source URL: www.eecg.toronto.edu

Language: English - Date: 2011-05-13 23:34:31