Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
X86 virtualization
Applied sciences
Computer engineering
Hardware engineering
Microprocessors
Graph Chatbot
Related lectures (30)
Login to filter by course
Login to filter by course
Reset
Previous
Page 2 of 3
Next
Isolation and Protection: Ensuring Process Security
Covers the concepts of isolation and protection in computer systems, focusing on process security and resource management techniques.
Advanced Metaprogramming Queries: Code Volume & Complexity
Explores challenges in code volume, complexity, and metaprogramming queries over code.
Process Abstraction: Managing Execution and Resources
Covers process abstraction in operating systems, focusing on execution management and resource allocation for concurrent program execution.
Virtual Memory: Memory Organization & Virtualization
Explores memory organization, virtualization, dynamic memory allocation, stack, heap, and memory virtualization techniques like base register and segmentation.
Memory Virtualization: Address Space Abstraction and Management
Covers memory virtualization, focusing on address space abstraction and the management of memory resources by the operating system.
Object Layout: Single Inheritance
Covers object layout challenges in single inheritance scenarios, focusing on Java-like languages and method dispatch using virtual methods tables.
Operating Systems: The Illusion of Resources
Explains how operating systems create the illusion of dedicated and infinite resources through virtualization and process abstraction.
Aggregation and Emulation: Resource Management in Computer Systems
Covers aggregation and emulation techniques for managing computer system resources effectively.
Virtualization: Principles and Applications
Explores virtualization principles, implementation, and high availability in cloud computing.
Intelligent Real-time Systems: Women in DB Award
Discusses JIT engines, HTAP, data virtualization, and challenges for women in computer systems.