Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2576195acmconferencesBook PagePublication PagesveeConference Proceedingsconference-collections
VEE '14: Proceedings of the 10th ACM SIGPLAN/SIGOPS international conference on Virtual execution environments
ACM2014 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
VEE '14: 10th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments Salt Lake City Utah USA March 1 - 2, 2014
ISBN:
978-1-4503-2764-0
Published:
01 March 2014
Sponsors:

Bibliometrics
Skip Abstract Section
Abstract

Welcome to the 10th ACM SIGPLAN/SIGOPS Conference on Virtual Execution Environments (VEE'14). We are happy to present the community with a strong program covering a wide range of virtualization topics.

This year, authors registered 56 papers, of which 49 were finalized as complete submissions. The program committee (PC) consisted of 2 chairs and 18 researchers active in virtualizationrelated aspects of programming languages and operating systems. Members were allowed to submit papers; the co-chairs chose not to submit anything. Reviewing was double-blind and was done almost entirely by the committee, with a little assistance from outsiders with special expertise. All submissions received 4-5 reviews, and authors were given the opportunity for rebuttal before the PC meeting.

The program committee meeting was held in January at the IBM T.J. Watson Research Center in New York. Most of the committee members were present in person. In an 8-hour session, we individually discussed all papers but those that were marked as early rejects due to receiving only negative reviews. We followed conventional rules for conflict of interest, with conflicted members (including co-chairs) leaving the room during discussion of the conflicted papers. In the end, we accepted 18 papers for presentation at the conference, of which about half were shepherded by PC members.

In addition to the 18 accepted papers, the VEE'14 program includes two keynote presentations by Galen Hunt and Jan Vitek. We hope that the resulting proceedings will serve as a valuable reference for researchers and practitioners in the area of virtualization.

Skip Table Of Content Section
SESSION: Keynote #1
keynote
Experiences in the land of virtual abstractions

The Microsoft Research Drawbridge Project began with a simple question: Is it possible to achieve the benefits of hardware virtual machines without the overheads? Following that question, we have built a line of exploratory prototypes. These prototypes ...

SESSION: Bridging the semantic gap
research-article
Real-time deep virtual machine introspection and its applications

Virtual Machine Introspection (VMI) provides the ability to monitor virtual machines (VM) in an agentless fashion by gathering VM execution states from the hypervisor and analyzing those states to extract information about a running operating system (OS)...

research-article
Tesseract: reconciling guest I/O and hypervisor swapping in a VM

Double-paging is an often-cited, if unsubstantiated, problem in multi-level scheduling of memory between virtual machines (VMs) and the hypervisor. This problem occurs when both a virtualized guest and the hypervisor overcommit their respective physical ...

research-article
Virtual asymmetric multiprocessor for interactive performance of consolidated desktops

This paper presents virtual asymmetric multiprocessor, a new scheme of virtual desktop scheduling on multi-core processors for user-interactive performance. The proposed scheme enables virtual CPUs to be dynamically performance-asymmetric based on their ...

SESSION: Memory
research-article
Ginseng: market-driven memory allocation

Physical memory is the scarcest resource in today's cloud computing platforms. Cloud providers would like to maximize their clients' satisfaction by renting precious physical memory to those clients who value it the most. But real-world cloud clients ...

research-article
Mortar: filling the gaps in data center memory

Data center servers are typically overprovisioned, leaving spare memory and CPU capacity idle to handle unpredictable workload bursts by the virtual machines running on them. While this allows for fast hotspot mitigation, it is also wasteful. ...

research-article
CMD: classification-based memory deduplication through page access characteristics

Limited main memory size is considered as one of the major bottlenecks in virtualization environments. Content-Based Page Sharing (CBPS) is an efficient memory deduplication technique to reduce server memory requirements, in which pages with same ...

SESSION: Runtimes
research-article
MuscalietJS: rethinking layered dynamic web runtimes

Layered JavaScript engines, in which the JavaScript runtime is built on top another managed runtime, provide better extensibility and portability compared to traditional monolithic engines. In this paper, we revisit the design of layered JavaScript ...

research-article
A fast abstract syntax tree interpreter for R

Dynamic languages have been gaining popularity to the point that their performance is starting to matter. The effort required to develop a production-quality, high-performance runtime is, however, staggering and the expertise required to do so is often ...

research-article
Deoptimization for dynamic language JITs on typed, stack-based virtual machines

We are interested in implementing dynamic language runtimes on top of language-level virtual machines. Type specialization is a critical optimization for dynamic language runtimes: generic code that handles any type of data is replaced with specialized ...

SESSION: Keynote #2
keynote
The case for the three R's of systems research: repeatability, reproducibility and rigor

Computer systems research spans sub-disciplines that include embedded systems, programming languages, network- ing, and operating systems. In this talk my contention is that a number of structural factors inhibit quality systems re- search. Symptoms of ...

SESSION: Binary instrumentation
research-article
Efficient memory virtualization for Cross-ISA system mode emulation

Cross-ISA system-mode emulation has many important applications. For example, Cross-ISA system-mode emulation helps computer architects and OS developers trace and debug kernel execution-flow efficiently by emulating a slower platform (such as ARM) on a ...

research-article
A platform for secure static binary instrumentation

Program instrumentation techniques form the basis of many recent software security defenses, including defenses against common exploits and security policy enforcement. As compared to source-code instrumentation, binary instrumentation is easier to use ...

research-article
DBILL: an efficient and retargetable dynamic binary instrumentation framework using llvm backend

Dynamic Binary Instrumentation (DBI) is a core technology for building debugging and profiling tools for application executables. Most state-of-the-art DBI systems have focused on the same instruction set architecture (ISA) where the guest binary and ...

SESSION: Optimizations
research-article
COMMA: coordinating the migration of multi-tier applications

Multi-tier applications are widely deployed in today's virtualized cloud computing environments. At the same time, management operations in these virtualized environments, such as load balancing, hardware maintenance, workload consolidation, etc., often ...

research-article
Friendly barriers: efficient work-stealing with return barriers

This paper addresses the problem of efficiently supporting parallelism within a managed runtime. A popular approach for exploiting software parallelism on parallel hardware is task parallelism, where the programmer explicitly identifies potential ...

research-article
String deduplication for Java-based middleware in virtualized environments

To increase the memory efficiency in physical servers is a significant concern for increasing the number of virtual machines (VM) in them. When similar web application service runs in each guest VM, many string data with the same values are created in ...

SESSION: Reorganizing & debugging
research-article
Shrinking the hypervisor one subsystem at a time: a userspace packet switch for virtual machines

Efficient and secure networking between virtual machines is crucial in a time where a large share of the services on the Internet and in private datacenters run in virtual machines. To achieve this efficiency, virtualization solutions, such as Qemu/KVM, ...

research-article
A virtualized separation kernel for mixed criticality systems

Multi- and many-core processors are becoming increasingly popular in embedded systems. Many of these processors now feature hardware virtualization capabilities, such as the ARM Cortex A15, and x86 processors with Intel VT-x or AMD-V support. Hardware ...

research-article
Composable multi-level debugging with Stackdb

Virtual machine introspection (VMI) allows users to debug software that executes within a virtual machine. To support rich, whole-system analyses, a VMI tool must inspect and control systems at multiple levels of the software stack. Traditional ...

Contributors
  • IBM Research
  • Technion - Israel Institute of Technology
  • Technion - Israel Institute of Technology
Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

VEE '14 Paper Acceptance Rate 18 of 56 submissions, 32%;
Overall Acceptance Rate 80 of 235 submissions, 34%
YearSubmittedAcceptedRate
VEE '17431842%
VEE '16291034%
VEE '15501632%
VEE '14561832%
VEE '08571832%
Overall2358034%