Providing legacy computing compatibility

作者: Bruce L. Fleming , Arvind Mandhani , Achmed R. Zahir , Satish B. Acharya

DOI:

关键词:

摘要: In some embodiments if a transaction is directed at existing hardware, then the to hardware. If not sent through behavioral model. Other are described and claimed.

参考文章(12)
Ho-Seop Kim, Youfeng Wu, Mauricio Breternitz, On-demand emulation via user-level exception handling ,(2007)
Lawrence S. Rogel, Scott W. Devine, Gerald A. Fry, Prashanth P. Bungale, Virtualization with Fortuitously Sized Shadow Page Tables ,(2009)
Robert E. Gough, Jaya L. Jeyaseelan, Barnes Cooper, Power management of low power link states ,(2007)
James Robert Howard Hakewill, Microprocessor with dual-level address translation ,(2010)
Aravindh Puthiyaparambil, Terrence V. Powderly, Rajagopalan Subrahmanian, John A. Landis, James R. Hunter, Computer system para-virtualization using a hypervisor that is implemented in a partition of the host system ,(2004)
Jörg Brakensiek, Axel Dröge, Martin Botteck, Hermann Härtig, Adam Lackorzynski, Virtualization as an enabler for security in mobile devices Proceedings of the 1st workshop on Isolation and integration in embedded systems - IIES '08. pp. 17- 22 ,(2008) , 10.1145/1435458.1435462
Alexandra Aguiar, Fabiano Hessel, Embedded systems' virtualization: The next challenge? rapid system prototyping. pp. 1- 7 ,(2010) , 10.1109/RSP.2010.5656430