Workshop on Virtual Computer Systems最新文献

筛选
英文 中文
The design of the virtual memory aspects of a virtual machine 虚拟机的虚拟内存设计
Workshop on Virtual Computer Systems Pub Date : 1973-03-26 DOI: 10.1145/800122.803957
D. Parnas, W. R. Price
{"title":"The design of the virtual memory aspects of a virtual machine","authors":"D. Parnas, W. R. Price","doi":"10.1145/800122.803957","DOIUrl":"https://doi.org/10.1145/800122.803957","url":null,"abstract":"This paper discusses the design of a virtual memory mechanism for use as the first level of an operating system. The virtual memory mechanism provides a virtual machine which retains many of the properties of the host computer system. An implementation on the PDP-11/45 is briefly described.","PeriodicalId":386817,"journal":{"name":"Workshop on Virtual Computer Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1973-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133100435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
The design and implementation of a virtual machine operating system using a Virtual Access Method 利用虚拟访问方法设计和实现一个虚拟机操作系统
Workshop on Virtual Computer Systems Pub Date : 1973-03-26 DOI: 10.1145/800122.803945
James H. March
{"title":"The design and implementation of a virtual machine operating system using a Virtual Access Method","authors":"James H. March","doi":"10.1145/800122.803945","DOIUrl":"https://doi.org/10.1145/800122.803945","url":null,"abstract":"In the autumn of 1969, we decided to try a new approach to the design of a virtual machine operating system. Until that time, most installations using Virtual Machine Monitors merely ran operating systems that already existed for “stand-alone” use. Few, if any, installations had attempted to design and create an operating system that took advantage of its running environment. The Virtual Machine Monitor we were using was a highly modified version of CP-67 which was designed to operate on an IBM S/360 Model 67. Our design motivation centered on the reduction of CP-67 overhead by reducing the amount of virtual memory required to support the operating system. A secondary design goal was to produce a “production oriented” system. The resulting operating system should be able to be “tailored” to a particular user's requirements.\u0000 The design of the New System (NS), as it came to be called, revolved around the fact that it not only knew it was executing within a virtual machine, but took advantage of it. Special communication links were designed and installed allowing NS to more directly control its paging and I/O profile.","PeriodicalId":386817,"journal":{"name":"Workshop on Virtual Computer Systems","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1973-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116138107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Virtual machine or virtual operating system? 虚拟机还是虚拟操作系统?
Workshop on Virtual Computer Systems Pub Date : 1973-03-26 DOI: 10.1145/800122.803946
J. Bellino, C. Hans
{"title":"Virtual machine or virtual operating system?","authors":"J. Bellino, C. Hans","doi":"10.1145/800122.803946","DOIUrl":"https://doi.org/10.1145/800122.803946","url":null,"abstract":"Development of a multi-access system from an existing single-user system can be achieved by the virtual machine approach. If the virtual machines generated include as primitives the logical functions used by the single-user system activated on them, these extended virtual machines are able to support the single-user system at a decreased development, maintenance and running cost.","PeriodicalId":386817,"journal":{"name":"Workshop on Virtual Computer Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1973-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127369701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
On the relationship between virtual machines and emulators 论虚拟机与仿真器的关系
Workshop on Virtual Computer Systems Pub Date : 1973-03-26 DOI: 10.1145/800122.803952
E. Mallach
{"title":"On the relationship between virtual machines and emulators","authors":"E. Mallach","doi":"10.1145/800122.803952","DOIUrl":"https://doi.org/10.1145/800122.803952","url":null,"abstract":"The subjects of virtual machines and emulators have been treated as entirely separate. The purpose of this paper is to show that they have much in common. Not only do the usual implementations have many shared characteristics, but this commonality extends to the theoretical concepts on which they are based; the concepts of memory mapping and I/O operation simulation are discussed to emphasize this. The paper then discusses structural issues, and points out why the question of instruction set is becoming less valid as a point of distinction between the concepts. Possible combinations of virtual machines and emulators are discussed. In conclusion, it is recommended that workers in both fields keep the relationship between the two in mind.","PeriodicalId":386817,"journal":{"name":"Workshop on Virtual Computer Systems","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1973-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128405673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Virtual micromachines (Whatever happened to milliprocessors) 虚拟微机(无论微处理器发生了什么)
Workshop on Virtual Computer Systems Pub Date : 1973-03-26 DOI: 10.1145/800122.803959
H. Schwenk
{"title":"Virtual micromachines (Whatever happened to milliprocessors)","authors":"H. Schwenk","doi":"10.1145/800122.803959","DOIUrl":"https://doi.org/10.1145/800122.803959","url":null,"abstract":"The main point of this note is a rather obvious one: The notion of virtual computer systems applies to many levels (macro-, micro-, nano-, pico-, etc.) of processors and associated units as well as to conventional data processing systems. Since these processors and units of whatever level all include the same basic notion of computation, we have come to use the term computational theater to represent the idea of a formally described processing system, independent of the level of processing.\u0000 Self-virtualizability is not a likely property of today's microprocessors; however, the current trend toward user visible microprogramming may be expected to influence the architecture of microprocessing systems in ways that will lessen the difficulty of implementing a virtual microprocessing capability. This point is discussed below.","PeriodicalId":386817,"journal":{"name":"Workshop on Virtual Computer Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1973-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130435317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtual machines and data security 虚拟机和数据安全
Workshop on Virtual Computer Systems Pub Date : 1973-03-26 DOI: 10.1145/800122.803960
C. R. Attanasio
{"title":"Virtual machines and data security","authors":"C. R. Attanasio","doi":"10.1145/800122.803960","DOIUrl":"https://doi.org/10.1145/800122.803960","url":null,"abstract":"Our concern is the ability of the computing system to ensure that data under its control is accessed only in accordance with the explicit intention of the owner of the data, as expressed in the directory or access control table of the system.\u0000 We intend to use VM/370 as the base system for a study of how the security of data may be compromised. Our goal for this study is to be better able to evaluate different types of hardware and software system architectures with regard to their ability to provide security.","PeriodicalId":386817,"journal":{"name":"Workshop on Virtual Computer Systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1973-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128525715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Extended architecture and Hypervisor performance 扩展的体系结构和Hypervisor性能
Workshop on Virtual Computer Systems Pub Date : 1973-03-26 DOI: 10.1145/800122.803956
Carl J. Young
{"title":"Extended architecture and Hypervisor performance","authors":"Carl J. Young","doi":"10.1145/800122.803956","DOIUrl":"https://doi.org/10.1145/800122.803956","url":null,"abstract":"This paper is a brief summary of the impact that architecture extensions to hardware and software have upon the design and performance of software Hypervisors that are intended to provide the extended function in a virtual machine environment.","PeriodicalId":386817,"journal":{"name":"Workshop on Virtual Computer Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1973-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125311810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A recursive virtual machine architecture 一个递归的虚拟机架构
Workshop on Virtual Computer Systems Pub Date : 1973-03-26 DOI: 10.1145/800122.803951
H. Lauer, D. Wyeth
{"title":"A recursive virtual machine architecture","authors":"H. Lauer, D. Wyeth","doi":"10.1145/800122.803951","DOIUrl":"https://doi.org/10.1145/800122.803951","url":null,"abstract":"This paper summarizes the preliminary design of a computer system with a recursive, virtual machine architecture and gives a brief account of the considerations leading to that design . In this system, each process operates in its own address space, called its virtual memory, and can create other processes within its space and pass control to them. The newly create d processes can, recursively, create their own descendants without the knowledge or assistance of a supervisor. There is no “privileged” or “supervisor” state; protection is provided entirely by the virtual memory mechanism, and each interrupt is directed by hardware to the process designated to handle it. Virtual memories are segmented; moreover, paging is treated as a recursive application of segmentation and can occur at any level. The machine architecture encourages modular and hierarchical approaches to program design because of the high degree of protection afforded by the creation of new virtual memories at low cost.","PeriodicalId":386817,"journal":{"name":"Workshop on Virtual Computer Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1973-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128493574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
An efficient virtual machine implementation 一个高效的虚拟机实现
Workshop on Virtual Computer Systems Pub Date : 1900-01-01 DOI: 10.1145/800122.803949
R. Srodawa, L. Bates
{"title":"An efficient virtual machine implementation","authors":"R. Srodawa, L. Bates","doi":"10.1145/800122.803949","DOIUrl":"https://doi.org/10.1145/800122.803949","url":null,"abstract":"This paper describes the techniques used to implement an efficient virtual machine facility within MTS for the IBM System/360 Model 67. The goals of the project were to support the IBM Operating System, including the Indexed Sequential Access Method and Teleprocessing capabilities, as a subsystem under MTS with a maximum teleprocessing degradation of 30% for OS/360 programs and complete protection between OS/360 and MTS. The first attempt, using channel program relocation similar to that employed by CP-67, provided unacceptable response to teleprocessing requests which required indexed accesses to the data base. The second attempt obviated the need for most software relocation of channel programs by assuring that the OS/360 buffer areas and channel programs were allocated to main storage having addresses identical to their virtual addresses. Storage protection was accomplished by a hardware change to the IBM System/360 protection mechanism which created a two-level hierarchy of storage keys. Using these techniques the virtual machine met the goals of the project. The techniques employed are applicable to virtual memory systems other than MTS and the IBM System/360 Model 67","PeriodicalId":386817,"journal":{"name":"Workshop on Virtual Computer Systems","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132753218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Architecture of virtual machines 虚拟机架构
Workshop on Virtual Computer Systems Pub Date : 1899-12-30 DOI: 10.1145/800122.803950
R. Goldberg
{"title":"Architecture of virtual machines","authors":"R. Goldberg","doi":"10.1145/800122.803950","DOIUrl":"https://doi.org/10.1145/800122.803950","url":null,"abstract":"In this paper we develop a model which represents the addressing of resources by processes executing on a virtual machine. The model distinguishes two maps: the ø-map which represents the map visible to the operating system software running on the virtual machine, and the f-map which is invisible to that software but which is manipulated by the virtual machine monitor running on the real machine. The ø-map maps process names into resource names and the f-map maps virtual resource names into real resource names. Thus, a process running on a virtual machine addresses its resources under the composed map f o ø. In recursive operation, f maps from one virtual machine level to another and we have f o f o ... o f o ø.\u0000 The model is used to describe and characterize previous virtual machine designs. We also introduce and illustrate a general approach for implementing virtual machines which follows directly from the model. This design, the Hardware Virtualizer, handles all process exceptions directly within the executing virtual machine without software intervention. All resource faults (VM-faults) generated by a virtual machine are directed to the appropriate virtual machine monitor without the knowledge of processes on the virtual machine (regardless of the level of recursion).","PeriodicalId":386817,"journal":{"name":"Workshop on Virtual Computer Systems","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127240832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信