Proceedings of the 7th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments 2011
DOI: 10.1145/1952682.1952710
|View full text |Cite
|
Sign up to set email alerts
|

Selective hardware/software memory virtualization

Abstract: As virtualization becomes a key technique for supporting cloud computing, much effort has been made to reduce virtualization overhead, so a virtualized system can match its native performance. One major overhead is due to memory or page table virtualization. Conventional virtual machines rely on a shadow mechanism to manage page tables, where a shadow page table maintained by the VMM (Virtual Machine Monitor) maps virtual addresses to machine addresses while a guest maintains its own virtual to physical page t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
28
0
1

Year Published

2011
2011
2017
2017

Publication Types

Select...
3
3
3

Relationship

2
7

Authors

Journals

citations
Cited by 38 publications
(29 citation statements)
references
References 11 publications
0
28
0
1
Order By: Relevance
“…Therefore, the problem of deployment and scheduling in cloud is a very difficult problem. With the development of network technologies, the emergence of all kinds of mobile terminals for examples cell phones and pads have brought more conveniences to users [32][33][34][35]. The virtualization of embedded devices is a significant problem.…”
Section: Challenges and Conclusionmentioning
confidence: 99%
“…Therefore, the problem of deployment and scheduling in cloud is a very difficult problem. With the development of network technologies, the emergence of all kinds of mobile terminals for examples cell phones and pads have brought more conveniences to users [32][33][34][35]. The virtualization of embedded devices is a significant problem.…”
Section: Challenges and Conclusionmentioning
confidence: 99%
“…Private SPT would consume a greate amount of virtual address space. Setting write-protection to the switched-out GPTs is a common but expensive method to monitor the modification of GPT [24]. To reduce this overhead, we again intercept the TLB-invalidation instructions to identify modified page entries.…”
Section: Private Sptmentioning
confidence: 99%
“…In our previous experiments, we set the switching interval to 5 s. Wang et al (2011) propose that a 5-s interval is appropriate for triggering next decision. In order to verify if 5 s is most suitable for the SVM-ASP mechanism, we test our model using different decision intervals, so as to trigger the decision mechanism for every 2, 5, and 10 s. As shown in Fig.…”
Section: Verification With Different Switching Intervalsmentioning
confidence: 99%