Results 11 to 20 of about 736,538 (281)

Converting of virtual machine from different CAD/CAD environments and its configuring in desired environment [PDF]

open access: yesTehnika, 2022
This paper describes the conversion of a virtual machine from different CAD/CAD environments and its configuring in the desired environment, which often arises as a need when you want to simulate the operation of a specific machine. In this case, two CAD/
Živanović Saša T.   +1 more
doaj   +1 more source

Automatically bridging the semantic gap in machine introspection [PDF]

open access: yes, 2016
Disclosed are various embodiments that facilitate automatically bridging the semantic gap in machine introspection. It may be determined that a program executed by a first virtual machine is requested to introspect a second virtual machine. A system call
Fu, Yangchun, Lin, Zhiqiang
core   +1 more source

Kernel learning for ligand-based virtual screening: discovery of a new PPARgamma agonist [PDF]

open access: yes, 2010
Poster presentation at 5th German Conference on Cheminformatics: 23. CIC-Workshop Goslar, Germany. 8-10 November 2009 We demonstrate the theoretical and practical application of modern kernel-based machine learning methods to ligand-based virtual ...
Hansen, Katja   +9 more
core   +3 more sources

Screen-Cam Robust and Blind Watermarking for Tile Satellite Images

open access: yesIEEE Access, 2020
To achieve watermark synchronization from an image with perspective distortion is a challenge. This paper proposes a screen-cam robust and blind watermarking scheme for tile satellite images, which means we do not need any user interaction or additional ...
Weitong Chen   +4 more
doaj   +1 more source

DNALinux Virtual Desktop Edition [PDF]

open access: yes, 2007
The new version of DNALinux (VDE) is presented. DNALinux VDE is a departure from traditional distributions since it uses a virtual machine to bundle together the operating system and bioinformatics applications.
Sebastian Bassi, Virginia V. C. Gonzalez
core   +2 more sources

Pengembangan Purwarupa Laboratorium Virtual Berbasis VMWare dengan Terraform

open access: yesJournal of Internet and Software Engineering, 2023
Pada tahun-tahun terakhir, Laboratorium Virtual telah semakin marak digunakan oleh organisasi di seluruh dunia sebagai media pembelajaran dan tempat melatih skill di bidang teknologi informasi dengan menyediakan virtual machine lab yang dapat dibuat dan ...
Michael Putra Kusuma, Nur Rohman Rosyid
doaj   +1 more source

Influence of Hub Parameters on Joining Forces and Torque Transmission Output of Plastically-Joined Shaft-Hub-Connections with a Knurled Contact Surface

open access: yesMachines, 2018
A knurled interference fit is a machine part connection made by a plastic joining, which includes the advantages of commonly-used shaft-hub-connections. The combination of the friction and form fit, which are responsible for torque transmission, results ...
Lukáš Suchý   +3 more
doaj   +1 more source

Screen-Cam Robust Image Watermarking with Feature-Based Synchronization

open access: yesApplied Sciences, 2020
The screen-cam process, which is taking pictures of the content displayed on a screen with mobile phones or cameras, is one of the main ways that image information is leaked. However, traditional image watermarking methods are not resilient to screen-cam
Weitong Chen   +5 more
doaj   +1 more source

A methodology for testing virtualisation security [PDF]

open access: yes, 2017
There is a growing interest in virtualisation due to its central role in cloud computing, virtual desktop environments and Green IT. Data centres and cloud computing utilise this technology to run multiple operating systems on one physical server, thus ...
Coull, Natalie   +2 more
core   +2 more sources

Design of Monitoring Framework for Malicious Hidden Process on CloudStack [PDF]

open access: yesJisuanji gongcheng, 2016
Most cloud platforms like CloudStack have no safety plug-in or function to protect the virtual machines.Aiming at this problem,this paper proposes a monitoring framework for malicious hidden process based on Xen virtual machine monitor on CloudStack ...
CUI Jingsong,TIAN Changyou,GUO Chi,YIN Xue
doaj   +1 more source

Home - About - Disclaimer - Privacy