{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:13:23Z","timestamp":1763468003107,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,5,24]],"date-time":"2010-05-24T00:00:00Z","timestamp":1274659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,5,24]]},"DOI":"10.1145\/1815695.1815718","type":"proceedings-article","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T12:21:27Z","timestamp":1277209287000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["On the DMA mapping problem in direct device assignment"],"prefix":"10.1145","author":[{"given":"Ben-Ami","family":"Yassour","sequence":"first","affiliation":[{"name":"IBM Research--Haifa, Haifa, Israel"}]},{"given":"Muli","family":"Ben-Yehuda","sequence":"additional","affiliation":[{"name":"IBM Research--Haifa, Haifa, Israel"}]},{"given":"Orit","family":"Wasserman","sequence":"additional","affiliation":[{"name":"IBM Research--Haifa, Haifa, Israel"}]}],"member":"320","published-online":{"date-parts":[[2010,5,24]]},"reference":[{"unstructured":"AMD I\/O Virtualization Technology (IOMMU) Specification. http:\/\/www.amd.com\/us-en\/assets\/content_type\/white_papers_and_tech_docs\/34434.pdf. AMD I\/O Virtualization Technology (IOMMU) Specification . http:\/\/www.amd.com\/us-en\/assets\/content_type\/white_papers_and_tech_docs\/34434.pdf.","key":"e_1_3_2_1_1_1"},{"unstructured":"Intel Virtualization Technology for Directed I\/O Architecture Specification. http:\/\/download.intel.com\/technology\/computing\/vptech\/Intel(r)_VT_for_Direct_IO.pdf. Intel Virtualization Technology for Directed I\/O Architecture Specification . http:\/\/download.intel.com\/technology\/computing\/vptech\/Intel(r)_VT_for_Direct_IO.pdf.","key":"e_1_3_2_1_2_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1535\/itj.1003.02"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/1168917.1168860"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/945445.945462"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1147\/sj.52.0078"},{"key":"e_1_3_2_1_7_1","first-page":"71","volume-title":"OLS '06: The 2006 Ottawa Linux Symposium","author":"Ben-Yehuda M.","year":"2006","unstructured":"M. Ben-Yehuda , J. Mason , J. Xenidis , O. Krieger , L. van Doorn , J. Nakajima , A. Mallick , and E. Wahlig . Utilizing IOMMUs for virtualization in Linux and Xen . In OLS '06: The 2006 Ottawa Linux Symposium , pages 71 -- 86 , July 2006 . M. Ben-Yehuda, J. Mason, J. Xenidis, O. Krieger, L. van Doorn, J. Nakajima, A. Mallick, and E. Wahlig. Utilizing IOMMUs for virtualization in Linux and Xen. In OLS '06: The 2006 Ottawa Linux Symposium, pages 71--86, July 2006."},{"key":"e_1_3_2_1_8_1","first-page":"9","volume-title":"OLS '07: The 2007 Ottawa Linux Symposium","author":"Ben-Yehuda M.","year":"2007","unstructured":"M. Ben-Yehuda , J. Xenidis , M. Ostrowski , K. Rister , A. Bruemmer , and L. van Doorn . The price of safety: Evaluating IOMMU performance . In OLS '07: The 2007 Ottawa Linux Symposium , pages 9 -- 20 , July 2007 . M. Ben-Yehuda, J. Xenidis, M. Ostrowski, K. Rister, A. Bruemmer, and L. van Doorn. The price of safety: Evaluating IOMMU performance. In OLS '07: The 2007 Ottawa Linux Symposium, pages 9--20, July 2007."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/1346281.1346286"},{"key":"e_1_3_2_1_10_1","volume-title":"Online computation and competitive analysis","author":"Borodin A.","year":"1998","unstructured":"A. Borodin and R. El-Yaniv . Online computation and competitive analysis . Cambridge University Press , 1998 . A. Borodin and R. El-Yaniv. Online computation and competitive analysis. Cambridge University Press, 1998."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1006\/jcss.1995.1021"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/103418.103422"},{"volume-title":"WIOV '08: The First Workshop on I\/O Virtualization.","author":"Dong Y.","unstructured":"Y. Dong , Z. Yu , and G. Rose . SR-IOV networking in Xen: Architecture, design and implementation . In WIOV '08: The First Workshop on I\/O Virtualization. Y. Dong, Z. Yu, and G. Rose. SR-IOV networking in Xen: Architecture, design and implementation. In WIOV '08: The First Workshop on I\/O Virtualization.","key":"e_1_3_2_1_13_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.5555\/314161.314182"},{"key":"e_1_3_2_1_15_1","volume-title":"1st Workshop on Operating System and Architectural Support for the on demand IT InfraStructure (OASIS)","author":"Fraser K.","year":"2004","unstructured":"K. Fraser , H. Steven , R. Neugebauer , I. Pratt , A. Warfield , and M. Williamson . Safe hardware access with the Xen virtual machine monitor . In 1st Workshop on Operating System and Architectural Support for the on demand IT InfraStructure (OASIS) , 2004 . K. Fraser, H. Steven, R. Neugebauer, I. Pratt, A. Warfield, and M. Williamson. Safe hardware access with the Xen virtual machine monitor. In 1st Workshop on Operating System and Architectural Support for the on demand IT InfraStructure (OASIS), 2004."},{"volume-title":"OSDI '08: 8th USENIX Symposium on Operating System Design and Implementation.","author":"Gupta D.","unstructured":"D. Gupta , S. Lee , M. Vrable , S. Savage , A. C. Snoeren , G. Varghese , G. M. Voelker , and A. Vahdat . Difference engine: Harnessing memory redundancy in virtual machines . In OSDI '08: 8th USENIX Symposium on Operating System Design and Implementation. D. Gupta, S. Lee, M. Vrable, S. Savage, A. C. Snoeren, G. Varghese, G. M. Voelker, and A. Vahdat. Difference engine: Harnessing memory redundancy in virtual machines. In OSDI '08: 8th USENIX Symposium on Operating System Design and Implementation.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","first-page":"225","volume-title":"Ottawa Linux Symposium","author":"Kivity A.","year":"2007","unstructured":"A. Kivity , Y. Kamay , D. Laor , U. Lublin , and A. Liguori . KVM: the linux virtual machine monitor . In Ottawa Linux Symposium , pages 225 -- 230 , July 2007 . A. Kivity, Y. Kamay, D. Laor, U. Lublin, and A. Liguori. KVM: the linux virtual machine monitor. In Ottawa Linux Symposium, pages 225--230, July 2007."},{"key":"e_1_3_2_1_18_1","first-page":"2","volume-title":"OSDI '04: 6th Symposium on Opearting Systems Design &amp; Implementation","author":"Levasseur J.","unstructured":"J. Levasseur , V. Uhlig , J. Stoess , and S. G\u00f6tz . Unmodified device driver reuse and improved system dependability via virtual machines . In OSDI '04: 6th Symposium on Opearting Systems Design &amp; Implementation , page 2 , Berkeley, CA, USA. J. Levasseur, V. Uhlig, J. Stoess, and S. G\u00f6tz. Unmodified device driver reuse and improved system dependability via virtual machines. In OSDI '04: 6th Symposium on Opearting Systems Design &amp; Implementation, page 2, Berkeley, CA, USA."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1109\/IPDPS.2010.5470365"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1145\/1542275.1542309"},{"key":"e_1_3_2_1_21_1","first-page":"3","volume-title":"USENIX '06 Annual Technical Conference","author":"Liu J.","unstructured":"J. Liu , W. Huang , B. Abali , and D. K. Panda . High performance VMM-bypass I\/O in virtual machines . In USENIX '06 Annual Technical Conference , page 3 . J. Liu, W. Huang, B. Abali, and D. K. Panda. High performance VMM-bypass I\/O in virtual machines. In USENIX '06 Annual Technical Conference, page 3."},{"volume-title":"WIOV '08: The First Workshop on I\/O Virtualization.","author":"Magenheimer D.","unstructured":"D. Magenheimer , C. Mason , D. Mccracken , and K. Hackel . Paravirtualized paging . In WIOV '08: The First Workshop on I\/O Virtualization. D. Magenheimer, C. Mason, D. Mccracken, and K. Hackel. Paravirtualized paging. In WIOV '08: The First Workshop on I\/O Virtualization.","key":"e_1_3_2_1_22_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1145\/1272366.1272390"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/1508293.1508303"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1145\/1400097.1400108"},{"key":"e_1_3_2_1_26_1","first-page":"29","volume-title":"USENIX Annual Technical Conference","author":"Santos J. R.","year":"2008","unstructured":"J. R. Santos , Y. Turner , j. G. Janakiraman , and I. Pratt . Bridging the gap between software and hardware techniques for I\/O virtualization . In USENIX Annual Technical Conference , pages 29 -- 42 , June 2008 . J. R. Santos, Y. Turner, j. G. Janakiraman, and I. Pratt. Bridging the gap between software and hardware techniques for I\/O virtualization. In USENIX Annual Technical Conference, pages 29--42, June 2008."},{"key":"e_1_3_2_1_27_1","volume-title":"WIOV '08: The First Workshop on I\/O Virtualization","author":"Satran J.","year":"2008","unstructured":"J. Satran , L. Shalev , M. Ben-Yehuda , and Z. Machulsky . Scalable I\/O---a well-architected way to do scalable, secure and virtualized I\/O . In WIOV '08: The First Workshop on I\/O Virtualization , 2008 . J. Satran, L. Shalev, M. Ben-Yehuda, and Z. Machulsky. Scalable I\/O---a well-architected way to do scalable, secure and virtualized I\/O. In WIOV '08: The First Workshop on I\/O Virtualization, 2008."},{"key":"e_1_3_2_1_28_1","volume-title":"USENIX ATC '10: USENIX Annual Technical Conference","author":"Shalev L.","year":"2010","unstructured":"L. Shalev , J. Satran , E. Borovik , and M. Ben-Yehuda . Isostack---highly efficient network processing on dedicated cores . In USENIX ATC '10: USENIX Annual Technical Conference , 2010 . L. Shalev, J. Satran, E. Borovik, and M. Ben-Yehuda. Isostack---highly efficient network processing on dedicated cores. In USENIX ATC '10: USENIX Annual Technical Conference, 2010."},{"key":"e_1_3_2_1_29_1","first-page":"1","volume-title":"2002 USENIX Annual Technical Conference","author":"Sugerman J.","unstructured":"J. Sugerman , G. Venkitachalam , and B.-H. Lim . Virtualizing I\/O devices on VMware workstation's hosted virtual machine monitor . In 2002 USENIX Annual Technical Conference , pages 1 -- 14 . J. Sugerman, G. Venkitachalam, and B.-H. Lim. Virtualizing I\/O devices on VMware workstation's hosted virtual machine monitor. In 2002 USENIX Annual Technical Conference, pages 1--14."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.5555\/1060289.1060307"},{"key":"e_1_3_2_1_31_1","first-page":"15","volume-title":"Protection strategies for direct access to virtualized I\/O devices. In aUSENIX Annual Technical Conference","author":"Willmann P.","year":"2008","unstructured":"P. Willmann , S. Rixner , and A. L. Cox . Protection strategies for direct access to virtualized I\/O devices. In aUSENIX Annual Technical Conference , 2008 , pages 15 -- 28 . P. Willmann, S. Rixner, and A. L. Cox. Protection strategies for direct access to virtualized I\/O devices. In aUSENIX Annual Technical Conference, 2008, pages 15--28."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1109\/HPCA.2007.346208"},{"key":"e_1_3_2_1_33_1","first-page":"1008","volume-title":"CCGRID '05","author":"Wyckoff P.","unstructured":"P. Wyckoff and J. Wu . Memory registration caching correctness . In CCGRID '05 , pages 1008 -- 1015 . P. Wyckoff and J. Wu. Memory registration caching correctness. In CCGRID '05, pages 1008--1015."}],"event":{"acronym":"SYSTOR '10","name":"SYSTOR '10: The 3rd Annual Haifa Experimental Systems Conference","location":"Haifa Israel"},"container-title":["Proceedings of the 3rd Annual Haifa Experimental Systems Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1815695.1815718","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1815695.1815718","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:43Z","timestamp":1750246783000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1815695.1815718"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5,24]]},"references-count":33,"alternative-id":["10.1145\/1815695.1815718","10.1145\/1815695"],"URL":"https:\/\/doi.org\/10.1145\/1815695.1815718","relation":{},"subject":[],"published":{"date-parts":[[2010,5,24]]},"assertion":[{"value":"2010-05-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}