Results 41 to 50 of about 13,965 (202)

Classification of Existing Virtualization Methods Used in Telecommunication Networks

open access: yes, 2019
This article studies the existing methods of virtualization of different resources. The positive and negative aspects of each of the methods are analyzed, the perspectivity of the approach is noted.
Ageyev, Dmytro   +3 more
core   +1 more source

The Melbourne Institute Data Lab, a Secure Access Environment for Informing Future Social and Economic Policy

open access: yesAustralian Economic Review, Volume 58, Issue 3, Page 259-271, September 2025.
ABSTRACT Policy analysts and academics play a critical role in informing policy design, implementation and evaluation. They apply their understanding of current social and economic issues, test theoretical frameworks and present new ideas that are a part of the ecosystem for promoting and sustaining efficient and equitable delivery of government ...
Chaminda Rajeev Samarage   +1 more
wiley   +1 more source

Hypervisor-Based Efficient Proactive Recovery

open access: yes2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007), 2007
Proactive recovery is a promising approach for building fault and intrusion tolerant systems that tolerate an arbitrary number of faults during system lifetime. This paper investigates the benefits that a virtualization-based replication infrastructure can offer for implementing proactive recovery.
Hans P. Reiser, Rüdiger Kapitza
openaire   +2 more sources

On‐Demand Deployment of Edge Cloud Infrastructures for Federated Learning

open access: yesSoftware: Practice and Experience, Volume 55, Issue 8, Page 1377-1388, August 2025.
ABSTRACT Background Federated learning on the edge allows the use of more computing capacity and more complex training models while providing higher accuracy and bandwidth savings. However, the deployment and management of edge cloud infrastructures is still challenging due to its highly distributed nature.
Eduardo Huedo   +3 more
wiley   +1 more source

Hypervisor-assisted dynamic malware analysis

open access: yesCybersecurity, 2021
Malware analysis is a task of utmost importance in cyber-security. Two approaches exist for malware analysis: static and dynamic. Modern malware uses an abundance of techniques to evade both dynamic and static analysis tools.
Roee S. Leon   +3 more
doaj   +1 more source

TCG based approach for secure management of virtualized platforms: state-of-the-art [PDF]

open access: yes, 2010
There is a strong trend shift in the favor of adopting virtualization to get business benefits. The provisioning of virtualized enterprise resources is one kind of many possible scenarios.
Aslam, Mudassar, Gehrmann, Christian
core  

CloudSim 7G: An Integrated Toolkit for Modeling and Simulation of Future Generation Cloud Computing Environments

open access: yesSoftware: Practice and Experience, Volume 55, Issue 6, Page 1041-1058, June 2025.
ABSTRACT Background Cloud Computing has established itself as an efficient and cost‐effective paradigm for the execution of web‐based applications, and scientific workloads, that need elasticity and on‐demand scalability capabilities. However, the evaluation of novel resource provisioning and management techniques is a major challenge due to the ...
Remo Andreoli   +3 more
wiley   +1 more source

Let’s Get Physical: Rethinking the Static Partitioning Hypervisor Architecture for an MMU-Less Memory Model

open access: yesIEEE Access
Many industries, in particular automotive, are undergoing substantial transformations in their underlying electrical and electronic architecture (E/E), pushing for a transition from traditional flat architectures to more decentralized and zonal systems ...
Afonso Santos   +4 more
doaj   +1 more source

Clock Synchronization in Virtualized Distributed Real-Time Systems Using IEEE 802.1AS and ACRN

open access: yesIEEE Access, 2021
Virtualization of distributed real-time systems enables the consolidation of mixed-criticality functions on a shared hardware platform, easing system integration.
Jan Ruh   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy