BACKGROUND This invention relates to virtual machines. In particular, the invention relates to translation lookaside buffers that support a virtual-machine system. A virtual-machine system is a computer system that includes a virtual machine monitor…
A processor including a virtualization system of the processor with a memory virtualization support system to map a reference to guest-physical memory made by guest software executable on a virtual machine which in turn is executable on a host machin…
BACKGROUND A conventional virtual-machine monitor (VMM) typically runs on a computer and presents to other software the abstraction of one or more virtual machines. Each virtual machine may function as a self-contained platform, running its own "gues…
A processor including a virtualization system of the processor with a memory virtualization support system to map a reference to guest-physical memory made by guest software executable on a virtual machine which in turn is executable on a host machin…
BACKGROUND OF THE INVENTION The invention generally relates to virtual machine management, and more particularly to efficient scheduling of virtual machines using processor state information. Virtualization of machine resources has been of significan…
BACKGROUND INFORMATION An embodiment of the present invention relates generally to virtualization platforms and, more specifically, to a system and method to run components of a virtual machine monitor at a reduced privilege level. Various mechanisms…
Since plug-in will be replaced by RN as following years, what is the future of plug-in? the answer is virtual machine technology. Some engineers already have experience of installing a virtual machine on a PC. As long as the computer's memory is larg…
BACKGROUND OF THE INVENTION The present invention relates to virtual machine implementations, and in particular to a safe general purpose virtual machine that generates optimized virtual machine computer programs that are executable in a general purp…
BACKGROUND Computer viruses are a common problem for computer users. One typical mode of attack is to send an electronic mail message (e-mail) containing a file attachment to an unsuspecting user's computer. The file attachment contains malicious att…
BACKGROUND OF THE INVENTION A conventional virtual-machine monitor (VMM) typically runs on a computer and presents to other software the abstraction of one or more virtual machines. Each virtual machine may function as a self-contained platform, runn…