ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
18
views
8
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
841
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Fundamental Approaches to Software Engineering
Modeling and Abstraction of Memory Management in a Hypervisor
other
Author(s):
Pauline Bolignano
,
Thomas Jensen
,
Vincent Siles
Publication date
(Print):
2016
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Embodied Memory
Most cited references
8
Record
: found
Abstract
: not found
Book Chapter
: not found
VCC: A Practical System for Verifying Concurrent C
Ernie Cohen
,
Markus Dahlweid
,
Mark A. Hillebrand
…
(2009)
0
comments
Cited
52
times
– based on
0
reviews
Record
: found
Abstract
: not found
Conference Proceedings
: not found
seL4: From General Purpose to a Proof of Information Flow Enforcement
T. Murray
,
D. Matichuk
,
M. Brassil
…
(2013)
0
comments
Cited
17
times
– based on
0
reviews
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework
A Vasudevan
,
S Chaki
,
Limin Jia
…
(2013)
0
comments
Cited
6
times
– based on
0
reviews
All references
Author and book information
Book Chapter
Publication date (Print):
2016
Pages
: 214-230
DOI:
10.1007/978-3-662-49665-7_13
SO-VID:
ad27eed2-33d3-48cd-82e4-16b80183d492
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
The Death of Object-Oriented Programming
pp. 13
Automated Choreography Repair
pp. 31
A Graph-Based Semantics Workbench for Concurrent Asynchronous Programs
pp. 49
ABS-YARN: A Formal Framework for Modeling Hadoop YARN Clusters
pp. 66
Integrated Environment for Verifying and Running Distributed Components
pp. 87
Iterative and Incremental Model Generation by Logic Solvers
pp. 104
Automated Model Merge by Design Space Exploration
pp. 122
RuleMerger: Automatic Construction of Variability-Based Model Transformation Rules
pp. 141
Two-Step Transformation of Model Traversal EOL Queries for Large CDO Repositories
pp. 158
Mind the Gap! Automated Anomaly Detection for Potentially Unbounded Cardinality-Based Feature Models
pp. 179
Cut Branches Before Looking for Bugs: Sound Verification on Relaxed Slices
pp. 197
The Influences of Edge Instability on Change Propagation and Connectivity in Call Graphs
pp. 214
Modeling and Abstraction of Memory Management in a Hypervisor
pp. 231
Crowdsourced Bug Triaging: Leveraging Q&A Platforms for Bug Assignment
pp. 251
Model-Based Testing of Probabilistic Systems
pp. 269
An Iterative Decision-Making Scheme for Markov Decision Processes and Its Application to Self-adaptive Systems
pp. 287
Family-Based Modeling and Analysis for Probabilistic Systems – Featuring ProFeat
pp. 305
Statistical Model Checking of e-Motions Domain-Specific Modeling Languages
pp. 325
Towards Formal Proof Metrics
pp. 342
Reduction Rules for Colored Workflow Nets
pp. 359
Many-Valued Institutions for Constraint Specification
pp. 377
CafeInMaude: A CafeOBJ Interpreter in Maude
pp. 383
Verifying a Verifier: On the Formal Correctness of an LTS Transformation Verification Technique
pp. 401
Hybrid Session Verification Through Endpoint API Generation
pp. 419
PVAIR: Partial Variable Assignment InterpolatoR
Similar content
841
Machine Learning-based Ransomware Detection Using Low-level Memory Access Patterns Obtained From Live-forensic Hypervisor
Authors:
Manabu Hirano
,
Ryotaro Kobayashi
FlexArch: Flexible Controller Placement Architecture for Hypervisor Assisted vSDN-enabled 5G Networks
Authors:
Deborsi Basu
,
Abhishek Jain
,
Uttam Ghosh
…
Gemini: Guest-transparent honey files via hypervisor-level access redirection
Authors:
Zhongshu Gu
,
Brendan Saltaformaggio
,
Xiangyu Zhang
…
See all similar