skip to main content
10.1145/1952682acmconferencesBook PagePublication PagesveeConference Proceedingsconference-collections
VEE '11: Proceedings of the 7th ACM SIGPLAN/SIGOPS international conference on Virtual execution environments
ACM2011 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
VEE '11: ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments Newport Beach California USA March 9 - 11, 2011
ISBN:
978-1-4503-0687-4
Published:
09 March 2011
Sponsors:

Bibliometrics
Skip Abstract Section
Abstract

It is our pleasure to welcome you to the 7th ACM SIGPLAN/SIGOPS Conference on Virtual Execution Environments (VEE'11).

As the leading conference for presentation of research results on all aspects of virtualization, VEE brings together researchers representing a diverse set of interests. This year, we received 84 abstracts, 68 full submissions, and selected 20 papers for presentation at the conference. In selecting papers, the program committee placed high priority on work that is broadly informative and applicable to both researchers and practitioners. We are confident these papers will make for an interesting conference and a valuable contribution to the study and practice of virtualization. Additionally, the program includes a keynote presentation by David Bacon on virtualizing new forms of devices such as FPGAs.

VEE'11 is again co-located with the International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). Our authors, program committee, sponsors, and supporters all span the boundaries between operating systems and programming language implementation, and reflect equally strong academic and industrial interests in the field.

Skip Table Of Content Section
SESSION: Keynote
keynote
Virtualization in the age of heterogeneous machines

Since their invention over 40 years ago, virtual machines have been used to virtualize one or more von Neumann processors and their associated peripherals. System virtual machines provide the illusion that the user has their own instance of a physical ...

SESSION: Performance monitoring
research-article
Performance profiling of virtual machines

Profilers based on hardware performance counters are indispensable for performance debugging of complex software systems. All modern processors feature hardware performance counters, but current virtual machine monitors (VMMs) do not properly expose ...

research-article
Perfctr-Xen: a framework for performance counter virtualization

Virtualization is a powerful technique used for variety of application domains, including emerging cloud environments that provide access to virtual machines as a service. Because of the interaction of virtual machines with multiple underlying software ...

research-article
Dynamic cache contention detection in multi-threaded applications

In today's multi-core systems, cache contention due to true and false sharing can cause unexpected and significant performance degradation. A detailed understanding of a given multi-threaded application's behavior is required to precisely identify such ...

SESSION: Configuration
research-article
Rethink the virtual machine template

Server virtualization technology facilitates the creation of an elastic computing infrastructure on demand. There are cloud applications like server-based computing and virtual desktop that concern startup latency and require impromptu requests for VM ...

research-article
Dolly: virtualization-driven database provisioning for the cloud

Cloud computing platforms are becoming increasingly popular for e-commerce applications that can be scaled on-demand in a very cost effective way. Dynamic provisioning is used to autonomously add capacity in multi-tier cloud-based applications that see ...

research-article
ReHype: enabling VM survival across hypervisor failures

With existing virtualized systems, hypervisor failures lead to overall system failure and the loss of all the work in progress of virtual machines (VMs) running on the system. We introduce ReHype, a mechanism for recovery from hypervisor failures by ...

SESSION: Recovery
research-article
Fast and space-efficient virtual machine checkpointing

Checkpointing, i.e., recording the volatile state of a virtual machine (VM) running as a guest in a virtual machine monitor (VMM) for later restoration, includes storing the memory available to the VM. Typically, a full image of the VM's memory along ...

research-article
Fast restore of checkpointed memory using working set estimation

In order to make save and restore features practical, saved virtual machines (VMs) must be able to quickly restore to normal operation. Unfortunately, fetching a saved memory image from persistent storage can be slow, especially as VMs grow in memory ...

research-article
Fast and correct performance recovery of operating systems using a virtual machine monitor

Rebooting an operating system is a final but effective recovery technique. However, the system performance largely degrades just after the reboot due to the page cache being lost in the main memory. For fast performance recovery, we propose a new reboot ...

SESSION: Migration
research-article
Evaluation of delta compression techniques for efficient live migration of large virtual machines

Despite the widespread support for live migration of Virtual Machines (VMs) in current hypervisors, these have significant shortcomings when it comes to migration of certain types of VMs. More specifically, with existing algorithms, there is a high risk ...

research-article
CloudNet: dynamic pooling of cloud resources by live WAN migration of virtual machines

Virtual machine technology and the ease with which VMs can be migrated within the LAN, has changed the scope of resource management from allocating resources on a single server to manipulating pools of resources within a data center. We expect WAN ...

research-article
Workload-aware live storage migration for clouds

The emerging open cloud computing model will provide users with great freedom to dynamically migrate virtualized computing services to, from, and between clouds over the wide-area. While this freedom leads to many potential benefits, the running ...

SESSION: Security
research-article
Patch auditing in infrastructure as a service clouds

A basic requirement of a secure computer system is that it be up to date with regard to software security patches. Unfortunately, Infrastructure as a Service (IaaS) clouds make this difficult. They leverage virtualization, which provides functionality ...

research-article
Fine-grained user-space security through virtualization

This paper presents an approach to the safe execution of applications based on software-based fault isolation and policy-based system call authorization. A running application is encapsulated in an additional layer of protection using dynamic binary ...

SESSION: Virtualization techniques
research-article
Minimal-overhead virtualization of a large scale supercomputer

Virtualization has the potential to dramatically increase the usability and reliability of high performance computing (HPC) systems. However, this potential will remain unrealized unless overheads can be minimized. This is particularly challenging on ...

research-article
Virtual WiFi: bring virtualization from wired to wireless

As virtualization trend is moving towards "client virtualization", wireless virtualization remains to be one of the technology gaps that haven't been addressed satisfactorily. Today's approaches are mainly developed for wired network, and are not ...

research-article
SymCall: symbiotic virtualization through VMM-to-guest upcalls

Symbiotic virtualization is a new approach to system virtualization in which a guest OS targets the native hardware interface as in full system virtualization, but also optionally exposes a software interface that can be used by a VMM, if present, to ...

SESSION: Memory management
research-article
Overdriver: handling memory overload in an oversubscribed cloud

With the intense competition between cloud providers, oversubscription is increasingly important to maintain profitability. Oversubscribing physical resources is not without consequences: it increases the likelihood of overload. Memory overload is ...

research-article
Selective hardware/software memory virtualization

As virtualization becomes a key technique for supporting cloud computing, much effort has been made to reduce virtualization overhead, so a virtualized system can match its native performance. One major overhead is due to memory or page table ...

research-article
Hybrid binary rewriting for memory access instrumentation

Memory access instrumentation is fundamental to many applications such as software transactional memory systems, profiling tools and race detectors. We examine the problem of efficiently instrumenting memory accesses in x86 machine code to support ...

Contributors
  • Technion - Israel Institute of Technology
  • SUNY Oswego

Recommendations

Acceptance Rates

Overall Acceptance Rate80of235submissions,34%
YearSubmittedAcceptedRate
VEE '17431842%
VEE '16291034%
VEE '15501632%
VEE '14561832%
VEE '08571832%
Overall2358034%