You are here:

Operating System Virtualization for management and delivery of E-learning

, , , , Massey University, New Zealand

E-Learn: World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education, in Quebec City, Canada ISBN 978-1-880094-63-1 Publisher: Association for the Advancement of Computing in Education (AACE), San Diego, CA


This paper introduces an operating system virtual machine platform for deploying an e-learning environment. Managed e-learning environments are often web based and rely on a browser to minimize configuration on the client machine, however even in these scenarios it is not unusual to have very specific requirements of the client machine, browser type and version, JavaTM virtual machine version and even operating system. In the case of advanced e-learning tools such as affective intelligent tutoring systems, peer to peer collaboration tools etc, there are additional requirements associated with the affective sensors, camera, bio-mouse etc. An operating system virtual machine approach allows the software stack of the client to be pre-configured and distributed in one shot. This minimizes the client side configuration easing the adoption of the technology.


Messom, C., Sarrafzadeh, A., Gerdelan, A. & Johnson, M. (2007). Operating System Virtualization for management and delivery of E-learning. In T. Bastiaens & S. Carliner (Eds.), Proceedings of E-Learn 2007--World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education (pp. 7267-7273). Quebec City, Canada: Association for the Advancement of Computing in Education (AACE). Retrieved February 16, 2019 from .


View References & Citations Map


  1. Alexander S., Sarrafzadeh A. (2006). Easy with Eve: A Functional Affective Tutoring System. 8th Int. Conf. On Intelligent Tutoring Systems.
  2. Barham P., Dragovic B., Fraser K., HandS., Harris T., Ho A., Neugebauer R., Pratt I., and Warfield A. (2003). Xen and the art of virtualization. Proc. Of the ACM Symp. On Operating System Principles.
  3. Cherkasova L. And Gardner R. (2005). Measuring CPU Overhead for I/O Processing in the Xen Virtual Machine Monitor. Proc. Of the USENIX Annual Technical Conf.
  4. Clark C., Fraser K., HandS., Hansen J.G., Jul E., Limpach C., Pratt I., and Warfield A. (2005) Live Migration of Virtual Machines. Proc. Of the 2nd ACM/USENIX Symposium on Networked Systems Design and Implementation.
  5. Craig R.G., Messom C.H. (2002). Replicating Reality-a better way to understanding. Intl Conf on Computers in Education. (pp.1191-1195).
  6. Fraser K., HandS., Neugebauer R., Pratt I., Warfield A., and Williamson M. (2004). Safe hardware access with the Xen virtual machine monitor. 1st Workshop on Operating System and Architectural Support for the On-Demand IT Infrastructure.
  7. Jin H., Yin Z., Yang X., Wang F., Ma J., Wang H., Yin J. (2004). APPLE: A Novel P2P based E-Learning Environment. 6th Int. Workshop on Distributed Computing.
  8. Keil-Slawik R., Hampel T., Essmann B. (2005). Re-conceptualizing learning environments: a framework for pervasive elearning. Third IEEE Int. Conf. On Pervasive Computing and Communications Workshops. (pp.322 DASHDASH
  9. 326).King S.T., Chen P.M., Wang Y-M., Verbowski C., Wang H.J. And Lorch J.R. (2006). SubVirt: Implementing malware with virtual machines. Proc. Of the 2006 IEEE Symposium on Security and Privacy. (pp.314-327).
  10. Lee Y., Junginger M., Geller J.. (2003) High Performance Publisher/Subscriber Communication For Adaptive, Collaborative Web-based Learning. Journal of Distance Education Technologies. 1(3) (pp.14-27).
  11. Messom C.H., Craig R.G. (2002). Web Based Laboratory for Controlling Real Robot Systems. The Proc. Of the Biannual Conf. Of the Distance Education Association of New Zealand.
  12. Matthews J.N., Herne J.J., Deshane T.M., Jablonski P.A., Cherian L.R., and McCabe M.T.. (2005). Data Protection and Rapid Recovery From Attack With A Virtual Private File Server and Virtual Machine Appliances. Proc. Of the IASTED Int. Conf. On Communication, Network and Information Security. (pp.170–181).
  13. Menon A., Santos J.R., Turner Y., Janakiraman G.J., and Zwaenepoel W. (2005). Diagnosing Performance Overheads in the Xen Virtual Machine Environment. First ACM/USENIX Conf. On Virtual Execution Environments.
  14. Santhanam S., Elango P., Arpaci-Dusseau A., and Livny M. (2005). Deploying Virtual Machines as Sandboxes for the Grid. Second Workshop on Real, Large Distributed Systems.
  15. SenGupta G., Buhler A., Demidenko S., Messom C.H., Mukhopadhyay S.C. (2006). A Multi-tiered Framework for Virtual Instrumentation System (VIS), IEEE Instrumentation and Measurement Technology Conference. (pp.976-981).
  16. Travostino F., Daspit P., Gommans L., Jog C., de Laat C., Mambretti J., Monga I., van Oudenaarde B., Raghunath S., and Wang P.Y. (2006). Seamless live migration of virtual machines over the MAN/WAN. Future Generation Computer Systems. Vol. 22, no. 8, (pp. 901–907).

These references have been extracted automatically and may have some errors. If you see a mistake in the references above, please contact