Results 91 to 100 of about 13,965 (202)

Providing scalable single-operating-system NUMA abstraction of physically discrete resources

open access: yesETRI Journal
With an explosive increase of data produced annually, researchers have been attempting to develop solutions for systems that can effectively handle large amounts of data.
Baik Song An   +4 more
doaj   +1 more source

Towards a Security Reference Architecture for NFV. [PDF]

open access: yesSensors (Basel), 2022
Alnaim AK, Alwakeel AM, Fernandez EB.
europepmc   +1 more source

Automatic Generation of Simulators for Processors Enhanced for Security in Virtualization

open access: yesIEEE Access
All new computer architectures need to be performance evaluated for acceptance and simulation is the most widely used method for evaluation of new processor designs.
Swapneel C. Mhatre, Priya Chandran
doaj   +1 more source

Containers for Virtualization: An Overview

open access: yesApplied Computer Systems, 2018
Virtualization has enabled the commoditization of cloud computing, as the hardware resources have become available to run different environments and share computing resources amongst different enterprises.
Silva Vitor Goncalves da   +2 more
doaj   +1 more source

Antifragile and Resilient Geographical Information System Service Delivery in Fog Computing. [PDF]

open access: yesSensors (Basel), 2022
Mir TS   +7 more
europepmc   +1 more source

A bacterial genome assembly and annotation laboratory using a virtual machine. [PDF]

open access: yesBiochem Mol Biol Educ, 2023
Trofimova E   +4 more
europepmc   +1 more source

Hypervisor [PDF]

open access: yesDatenschutz und Datensicherheit - DuD, 2012
openaire   +1 more source

Home - About - Disclaimer - Privacy