scispace - formally typeset
C

Carl A. Waldspurger

Researcher at VMware

Publications -  125
Citations -  10911

Carl A. Waldspurger is an academic researcher from VMware. The author has contributed to research in topics: Virtual machine & Cache. The author has an hindex of 50, co-authored 123 publications receiving 10775 citations. Previous affiliations of Carl A. Waldspurger include PARC & Hewlett-Packard.

Papers
More filters
Journal ArticleDOI

Memory resource management in VMware ESX server

TL;DR: Several novel ESX Server mechanisms and policies for managing memory are introduced, including a ballooning technique that reclaims the pages considered least valuable by the operating system running in a virtual machine, and an idle memory tax that achieves efficient memory utilization.
Journal ArticleDOI

Spawn: a distributed computational economy

TL;DR: Using concurrent Monte Carlo simulations as prototypical applications, the authors explore issues of fairness in resource distribution, currency as a form of priority, price equilibria, the dynamics of transients, and scaling to large systems.
Proceedings ArticleDOI

Lottery scheduling: flexible proportional-share resource management

TL;DR: A prototype lottery scheduler for the Mach 3.0 microkernel is implemented, and it is found that it provides flexible and responsive control over the relative execution rates of a wide range of applications.
Journal ArticleDOI

Continuous profiling: where have all the cycles gone?

TL;DR: The Digital Continuous Profiling Infrastructure is a sampling-based profiling system designed to run continuously on production systems, supporting multiprocessors, works on unmodified executables, and collects profiles for entire systems, including user programs, shared libraries, and the operating system kernel.
Proceedings ArticleDOI

Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems

TL;DR: A virtual-machine-based system called Overshadow is introduced that protects the privacy and integrity of application data, even in the event of a total OS compromise, and is used to protect a wide range of unmodified legacy applications running on an unmodified Linux operating system.