{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T17:10:17Z","timestamp":1746551417360,"version":"3.37.3"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2016,10,1]],"date-time":"2016-10-01T00:00:00Z","timestamp":1475280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/100007431","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007431","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003621","name":"Ministry of Science, ICT & Future Planning","doi-asserted-by":"publisher","award":["2012R1A1A1042938","2013R1A3A2003664"],"award-info":[{"award-number":["2012R1A1A1042938","2013R1A3A2003664"]}],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Program of Seoul National University (SNU)"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput."],"published-print":{"date-parts":[[2016,10,1]]},"DOI":"10.1109\/tc.2016.2519890","type":"journal-article","created":{"date-parts":[[2016,1,20]],"date-time":"2016-01-20T20:59:19Z","timestamp":1453323559000},"page":"3041-3054","source":"Crossref","is-referenced-by-count":8,"title":["Efficient Checkpointing of Live Virtual Machines"],"prefix":"10.1109","volume":"65","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6645-6161","authenticated-orcid":false,"given":"Bernhard","family":"Egger","sequence":"first","affiliation":[]},{"given":"Younghyun","family":"Cho","sequence":"additional","affiliation":[]},{"given":"Changyeon","family":"Jo","sequence":"additional","affiliation":[]},{"given":"Eunbyun","family":"Park","sequence":"additional","affiliation":[]},{"given":"Jaejin","family":"Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"273","article-title":"Live migration of virtual machines","author":"clark","year":"0","journal-title":"Proc 2nd Conf Symp Netw Syst Des Implementation"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346286"},{"key":"ref31","first-page":"29","article-title":"Bridging the gap between software and hardware techniques for I\/O virtualization","author":"santos","year":"0","journal-title":"Proc Annu Conf USENIX Ann Tech Conf"},{"key":"ref30","first-page":"3","article-title":"High performance VMM-bypass I\/O in virtual machines","author":"liu","year":"0","journal-title":"Proc Annu Conf USENIX Annu Tech Conf"},{"key":"ref34","first-page":"25","article-title":"Fast transparent migration for virtual machines","author":"nelson","year":"0","journal-title":"Proc Annu Conf USENIX Annu Tech Conf"},{"journal-title":"Understanding the Linux Kernel","year":"2005","author":"bovet","key":"ref10"},{"year":"0","key":"ref11"},{"journal-title":"Linux J","year":"2008","author":"habib","key":"ref12"},{"year":"0","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/945461.945462"},{"year":"0","key":"ref15"},{"key":"ref16","first-page":"191","article-title":"Transcendent memory and Linux","author":"magenheimer","year":"0","journal-title":"Proc Linux Symp"},{"key":"ref17","first-page":"313","article-title":"Collaborative memory management in hosted Linux environments","author":"schwidefsky","year":"0","journal-title":"Proc Linux Symp"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265930"},{"key":"ref19","article-title":"Satori: Enlightened page sharing","author":"milos","year":"0","journal-title":"Proc USENIX Annu Technical Conf"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060309"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060307"},{"key":"ref27","first-page":"1","article-title":"Debugging operating systems with time-traveling virtual machines","author":"king","year":"0","journal-title":"Proc Annu Conf USENIX Annu Tech Conf"},{"key":"ref3","article-title":"Difference engine: Harnessing memory redundancy in virtual machines","author":"gupta","year":"0","journal-title":"Proc Symp Oper Syst Des Implementation"},{"key":"ref6","first-page":"161","article-title":"Remus: High availability via asynchronous virtual machine replication","author":"cully","year":"0","journal-title":"Proc 5th USENIX Symp Netw Syst Des Implementation"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519067"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1145\/225535.225538","article-title":"Hypervisor-based fault tolerance","volume":"14","author":"c","year":"1996","journal-title":"ACM Trans Comput Syst"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2451512.2451524"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095825"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1508293.1508297"},{"year":"0","key":"ref9"},{"year":"2009","author":"armbrust","key":"ref1"},{"key":"ref20","article-title":"Black-box and gray-box strategies for virtual machine migration","author":"wood","year":"0","journal-title":"Proc 5th USENIX Symp Netw Syst Des Implementation"},{"key":"ref22","first-page":"1","article-title":"Virtual machine memory access tracing with hypervisor exclusive cache","author":"lu","year":"0","journal-title":"Proc USENIX Annu Tech Conf"},{"key":"ref21","first-page":"14","article-title":"Geiger: Monitoring the buffer cache in a virtual machine environment","author":"jones","year":"0","journal-title":"Proc 6th Int Conf Archit Support Program Lang Oper Syst"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2007477.1952695"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1024393.1024415"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1952682.1952694"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-013-0295-0"}],"container-title":["IEEE Transactions on Computers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/12\/7560676\/07387729.pdf?arnumber=7387729","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:20:56Z","timestamp":1642004456000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7387729\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,1]]},"references-count":34,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tc.2016.2519890","relation":{},"ISSN":["0018-9340"],"issn-type":[{"type":"print","value":"0018-9340"}],"subject":[],"published":{"date-parts":[[2016,10,1]]}}}