Results 111 to 120 of about 389,766 (311)
Shamir-based virtual machine placement policy
In order to alleviate the harm of co-location attack in cloud environment,a virtual machine placement strategy based on Shamir was proposed,and a virtual machine placement framework was designed.The security of key data was ensured by the blockchain in ...
Junfeng TIAN+3 more
doaj +2 more sources
A Review of Virtual Machine Attack Based on Xen
Virtualization technology as the foundation of cloud computing gets more and more attention because the cloud computing has been widely used. Analyzing the threat with the security of virtual machine and summarizing attack about virtual machine based on ...
Ren xun-yi, Zhou yu-qi
doaj +1 more source
This paper presents a performance analysis of two open-source, laser scanner-based Simultaneous Localization and Mapping (SLAM) techniques (i.e., Gmapping and Hector SLAM) using a Microsoft Kinect to replace the laser sensor.
Kamarulzaman Kamarudin+3 more
doaj +1 more source
Urban Advanced Mobility Dependability: A Model-Based Quantification on Vehicular Ad Hoc Networks with Virtual Machine Migration. [PDF]
Silva LG+9 more
europepmc +1 more source
A Survey of Virtualization Technologies With Performance Testing [PDF]
Virtualization has rapidly become a go-to technology for increasing efficiency in the data center. With virtualization technologies providing tremendous flexibility, even disparate architectures may be deployed on a single machine without interference.
arxiv
A parallel virtual machine for efficient scheme compilation [PDF]
Marc Feeley, James S. Miller
openalex +1 more source
A novel self‐powered wearable pressure sensor is fabricated using chitosan‐ZnO composite piezoelectric film, achieving sensitivities of 70.71 mV/kPa and 471.43 mV Hz−1. This lightweight and biodegradable device emulates mechanoreceptors for applications such as object classification, wireless data transmission, and gesture recognition, offering an eco ...
Zhao Wang+5 more
wiley +1 more source
Stability optimization of dynamic migration algorithm for Post-Copy of virtual machine based on KVM
The dynamic migration technology of virtual machine provides a strong support for the resource scheduling of virtualization system.As one of the two core algorithms of virtual machine dynamic migration, Post-Copy algorithm has been a hot issue for ...
Shuangxi CHEN+4 more
doaj
Simulation-Based Cybersecurity Testing and Evaluation Method for Connected Car V2X Application Using Virtual Machine. [PDF]
Lee DH+4 more
europepmc +1 more source
Scalable Group Management in Large-Scale Virtualized Clusters [PDF]
To save cost, recently more and more users choose to provision virtual machine resources in cluster systems, especially in data centres. Maintaining a consistent member view is the foundation of reliable cluster managements, and it also raises several challenge issues for large scale cluster systems deployed with virtual machines (which we call ...
arxiv