{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T09:03:41Z","timestamp":1725440621138},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,1]]},"DOI":"10.1109\/ccnc.2009.4784873","type":"proceedings-article","created":{"date-parts":[[2009,2,19]],"date-time":"2009-02-19T23:13:08Z","timestamp":1235085188000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["A Virtual Window System for CE Devices Based on System Virtualization"],"prefix":"10.1109","author":[{"given":"Sung-Min","family":"Lee","sequence":"first","affiliation":[]},{"given":"Sang-Bum","family":"Suh","sequence":"additional","affiliation":[]},{"given":"Sangdok","family":"Mo","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Trofimov","sequence":"additional","affiliation":[]},{"given":"Bokdeuk","family":"Jeong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"i.mx21 applications processor: reference manual","year":"2004","author":"freescale","key":"19"},{"article-title":"l4 reference manual","year":"1996","author":"liedtke","key":"17"},{"journal-title":"The GPE Palmtop Environment","year":"0","key":"18"},{"key":"15","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1109\/CSAC.2005.7","article-title":"a nitpicker's guide to a minimal-complexity secure gui","author":"feske","year":"2005","journal-title":"Proceedings of the 21st Annual Computer Security Applications Conference"},{"article-title":"the fiasco kernel: system architecture","year":"2002","author":"hohmuth","key":"16"},{"year":"0","key":"13"},{"journal-title":"Fusion High level IPC","year":"2003","author":"kropp","key":"14"},{"journal-title":"TinyX","year":"0","key":"11"},{"journal-title":"DirectFB Overview","year":"2004","author":"hundt","key":"12"},{"journal-title":"GtkPerf","year":"0","key":"21"},{"key":"3","article-title":"secure xen on arm: status and driver domain seprarion","author":"suh","year":"2007","journal-title":"5th Xen Summit"},{"year":"0","key":"20"},{"key":"2","article-title":"secure architecture and implementation of xen on arm for mobile device","author":"suh","year":"2007","journal-title":"3rd Xen Summit IBM T J Watson"},{"year":"0","author":"xen","key":"1"},{"journal-title":"The X Window System in a Nutshell","year":"1992","author":"gilly","key":"10"},{"journal-title":"Trango","year":"0","key":"7"},{"journal-title":"VirtualLogics","year":"0","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ccnc08.2007.63"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ccnc08.2007.64"},{"key":"9","article-title":"safe hardware access with the xen virtual machine monitor","author":"fraser","year":"2004","journal-title":"Proc First Workshop Operating System and Architectural Support for the On-Demand IT Infrastructure (OASIS)"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/945461.945462"}],"event":{"name":"2009 6th IEEE Consumer Communications and Networking Conference (CCNC)","start":{"date-parts":[[2009,1,10]]},"location":"Las Vegas, Nevada, USA","end":{"date-parts":[[2009,1,13]]}},"container-title":["2009 6th IEEE Consumer Communications and Networking Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4784683\/4784684\/04784873.pdf?arnumber=4784873","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T16:57:13Z","timestamp":1497805033000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4784873\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,1]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2009.4784873","relation":{},"subject":[],"published":{"date-parts":[[2009,1]]}}}