{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:07:51Z","timestamp":1759133271528},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,2,5]],"date-time":"2015-02-05T00:00:00Z","timestamp":1423094400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1007\/s11227-014-1375-7","type":"journal-article","created":{"date-parts":[[2015,2,4]],"date-time":"2015-02-04T02:55:22Z","timestamp":1423018522000},"page":"1484-1504","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Gem5v: a modified gem5 for simulating virtualized systems"],"prefix":"10.1007","volume":"71","author":[{"given":"Seyed Hossein","family":"Nikounia","sequence":"first","affiliation":[]},{"given":"Siamak","family":"Mohammadi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,2,5]]},"reference":[{"key":"1375_CR1","unstructured":"AMD-V. http:\/\/www.amd.com\/virtualization . Accessed on Nov 2012. Accessed 5 May 2014"},{"key":"1375_CR2","unstructured":"Gartner: estimate of virtualized workloads. http:\/\/gartner.com\/it\/page.jsp?id=1211813 . Accessed 1 May 2014"},{"key":"1375_CR3","unstructured":"Gem5. http:\/\/gem5.org . Accessed 5 May 2014"},{"key":"1375_CR4","unstructured":"[gem5-users] Running Xen in gem5. http:\/\/www.mail-archive.com\/gem5-users@gem5.org\/msg00367.html . Accessed 1 Jan 2014"},{"key":"1375_CR5","unstructured":"How does it take to make context switch. http:\/\/blog.tsunanet.net\/2010\/11\/how-long-does-it-take-to-make-context.html . Accessed 1 May 2014"},{"key":"1375_CR6","unstructured":"Intel Xeon. http:\/\/www.intel.com\/content\/www\/us\/en\/servers\/server-products.html . Accessed on Nov 2012. Accessed 1 May 2014"},{"key":"1375_CR7","unstructured":"Parsec 2.1 for m5. http:\/\/www.cs.utexas.edu\/cart\/parsec_m5 . Accessed 5 May 2014"},{"key":"1375_CR8","unstructured":"Splash 2. http:\/\/www-flash.stanford.edu\/apps\/SPLASH . Accessed 1 Jan 2014"},{"key":"1375_CR9","unstructured":"VMware. http:\/\/vmware.com . Accessed 5 May 2014"},{"key":"1375_CR10","doi-asserted-by":"crossref","unstructured":"Apparao P, Iyer R, Newell D (2008) Implications of cache asymmetry on server consolidation performance. In: IEEE international symposium on workload characterization, pp 24\u201332","DOI":"10.1109\/IISWC.2008.4636088"},{"key":"1375_CR11","doi-asserted-by":"crossref","unstructured":"Bhadauria M, Weaver VM, McKee SA (2009) Understanding PARSEC performance on contemporary CMPs. In: IEEE international symposium on workload characterization, pp 98\u2013107","DOI":"10.1109\/IISWC.2009.5306793"},{"key":"1375_CR12","unstructured":"Bienia C, Li K (2009) Parsec 2.0: a new benchmark suite for chip-multiprocessors. In: Workshop on modeling, benchmarking and simulation"},{"issue":"2","key":"1375_CR13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2024716.2024718","volume":"39","author":"N Binkert","year":"2011","unstructured":"Binkert N, Beckmann BM, Black G, Reinhardt S, Saidi A, Basu A, Hestness J, Hower D, Krishna T, Sardashti S, Sen R, Sewell K, Shoaib M, Vaish N, Hill M, Wood D (2011) The gem5 simulator. SIGARCH Comput Archit News 39(2):1\u20137","journal-title":"SIGARCH Comput Archit News"},{"issue":"1","key":"1375_CR14","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1002\/spe.995","volume":"41","author":"RN Calheiros","year":"2010","unstructured":"Calheiros RN, Ranjan R, Beloglazov A, De Rose CAF, Buyya R (2010) CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Softw Pract Exp 41(1):23\u201350","journal-title":"Softw Pract Exp"},{"issue":"3","key":"1375_CR15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2324876.2324877","volume":"30","author":"C Dall","year":"2012","unstructured":"Dall C, Andrus J, Hof AV, Laadan O, Nieh J (2012) The design, implementation, and evaluation of cells: a virtual smartphone architecture. ACM Trans Comput Syst 30(3):1\u201331","journal-title":"ACM Trans Comput Syst"},{"key":"1375_CR16","unstructured":"Gal-On S, Levy M Exploring CoreMark\u2014a benchmark maximizing simplicity and efficacy. EEMBC Whitepaper. http:\/\/www.eembc.org\/techlit\/coremark-whitepaper.pdf"},{"key":"1375_CR17","doi-asserted-by":"crossref","unstructured":"Garcia-Guirado A, Fernandez-Pascual R, Garcia J (2010) Analyzing cache coherence protocols for server consolidation. In: International symposium on computer architecture and high performance computing, pp 191\u2013198","DOI":"10.1109\/SBAC-PAD.2010.31"},{"key":"1375_CR18","unstructured":"Garcia-Guirado A, Fernandez-Pascual R, Garcia JM (2009) Virtual-GEMS: an infrastructure to simulate virtual machines. In: International workshop on modeling, benchmarking and simulation"},{"key":"1375_CR19","doi-asserted-by":"crossref","unstructured":"Garcia-Guirado A, Fernandez-Pascual R, Ros A, Garcia J (2011) Energy-efficient cache coherence protocols in chip-multiprocessors for server consolidation. In: International conference on parallel processing, pp 51\u201362","DOI":"10.1109\/ICPP.2011.44"},{"issue":"4","key":"1375_CR20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1186736.1186737","volume":"34","author":"JL Henning","year":"2006","unstructured":"Henning JL (2006) SPEC CPU2006 benchmark descriptions. ACM SIGARCH Comput Archit News 34(4):1\u201317","journal-title":"ACM SIGARCH Comput Archit News"},{"key":"1375_CR21","doi-asserted-by":"crossref","unstructured":"Iyer R, Zhao L, Guo F, Illikkal R, Makineni S, Newell D, Solihin Y, Hsu L, Reinhardt S (2007) QoS policies and architecture for cache\/memory in CMP platforms. In: ACM SIGMETRICS international conference on measurement and modeling of computer systems, pp 1\u201312. ACM request permissions","DOI":"10.1145\/1269899.1254886"},{"key":"1375_CR22","doi-asserted-by":"crossref","unstructured":"Jin X, Chen H, Wang X, Wang Z, Wen X, Luo Y, Li X (2009) A simple cache partitioning Approach in a virtualized environment. In: IEEE international symposium on parallel and distributed processing with applications, pp 519\u2013524","DOI":"10.1109\/ISPA.2009.47"},{"key":"1375_CR23","doi-asserted-by":"crossref","unstructured":"Kim D, Ahn J, Kim J, Huh J (2010) Subspace snooping: filtering snoops with operating system support. In: International conference on parallel architectures and compilation techniques, pp 111\u2013122, ACM","DOI":"10.1145\/1854273.1854292"},{"key":"1375_CR24","doi-asserted-by":"crossref","unstructured":"Kim D, Kim H, Huh J (2010) Virtual snooping: filtering snoops in virtualized multi-cores. In: IEEE\/ACM international symposium on microarchitecture, pp 459\u2013470","DOI":"10.1109\/MICRO.2010.16"},{"key":"1375_CR25","unstructured":"Kivity A, Kamay Y, Laor D, Lublin U, Liguori A (2007) kvm: the Linux virtual machine monitor. In: Linux symposium, pp 225\u2013230"},{"key":"1375_CR26","doi-asserted-by":"crossref","unstructured":"Koller R, Verma A, Rangaswami R (2011) Estimating application cache requirement for provisioning caches in virtualized systems. In: IEEE annual international symposium on modelling, analysis, and simulation of computer and telecommunication systems, pp 55\u201362. IEEE Computer Society","DOI":"10.1109\/MASCOTS.2011.67"},{"issue":"2","key":"1375_CR27","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/2.982916","volume":"35","author":"PS Magnusson","year":"2002","unstructured":"Magnusson PS, Christensson M, Eskilson J, Forsgren D, Hallberg G, Hogberg J, Larsson F, Moestedt A, Werner B (2002) Simics: a full system simulation platform. Computer 35(2):50\u201358","journal-title":"Computer"},{"issue":"4","key":"1375_CR28","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1145\/1105734.1105747","volume":"33","author":"MMK Martin","year":"2005","unstructured":"Martin MMK, Sorin DJ, Beckmann BM, Marty MR, Xu M, Alameldeen AR, Moore KE, Hill MD, Wood DA (2005) Multifacet\u2019s general execution-driven multiprocessor simulator (GEMS) toolset. SIGARCH Comput Archit News 33(4):92\u201399","journal-title":"SIGARCH Comput Archit News"},{"issue":"4","key":"1375_CR29","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1145\/1899928.1899933","volume":"44","author":"R McDougall","year":"2010","unstructured":"McDougall R, Anderson J (2010) Virtualization performance: perspectives and challenges ahead. SIGOPS Oper Syst Rev 44(4):40\u201356","journal-title":"SIGOPS Oper Syst Rev"},{"key":"1375_CR30","doi-asserted-by":"crossref","unstructured":"Srikantaiah S, Kandemir M, Wang Q (2009) Sharp control: controlled shared cache management in chip multiprocessors. In: IEEE\/ACM international symposium on microarchitecture, pp 517\u2013528, IEEE","DOI":"10.1145\/1669112.1669177"},{"key":"1375_CR31","doi-asserted-by":"crossref","unstructured":"Talbot J, Yoo RM, Kozyrakis C (2011) Phoenix++: modular MapReduce for shared-memory systems. In: MapReduce \u201911: Proceedings of the 2nd international workshop on MapReduce and its applications, pp 9\u201316. ACM request permissions","DOI":"10.1145\/1996092.1996095"},{"issue":"5","key":"1375_CR32","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MC.2005.163","volume":"38","author":"R Uhlig","year":"2005","unstructured":"Uhlig R, Neiger G, Rodgers D, Santoni A, Martins F, Anderson A, Bennett S, Kagi A, Leung F, Smith L (2005) Intel virtualization technology. Computer 38(5):48\u201356","journal-title":"Computer"},{"key":"1375_CR33","doi-asserted-by":"crossref","unstructured":"Varanasi P, Heiser G (2011) Hardware-supported virtualization on ARM. In: Second Asia-Pacific workshop on systems, pp 1\u20135, ACM","DOI":"10.1145\/2103799.2103813"},{"key":"1375_CR34","doi-asserted-by":"crossref","unstructured":"Woo S, Ohara M, Torrie E, Singh J, Gupta A (1995) The SPLASH-2 programs: characterization and methodological considerations. In: International symposium on computer architecture, pp 24\u201336","DOI":"10.1145\/225830.223990"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-014-1375-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-014-1375-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-014-1375-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,20]],"date-time":"2019-08-20T15:55:41Z","timestamp":1566316541000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-014-1375-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,5]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,4]]}},"alternative-id":["1375"],"URL":"https:\/\/doi.org\/10.1007\/s11227-014-1375-7","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,2,5]]}}}