Results 21 to 30 of about 4,567,161 (224)

SEVered: Subverting AMD's Virtual Machine Encryption [PDF]

open access: yesEuroSec@EuroSys, 2018
AMD SEV is a hardware feature designed for the secure encryption of virtual machines. SEV aims to protect virtual machine memory not only from other malicious guests and physical attackers, but also from a possibly malicious hypervisor.
M. Morbitzer   +3 more
semanticscholar   +1 more source

Pengembangan Purwarupa Laboratorium Virtual Berbasis VMWare dengan Terraform

open access: yesJournal of Internet and Software Engineering, 2023
Pada tahun-tahun terakhir, Laboratorium Virtual telah semakin marak digunakan oleh organisasi di seluruh dunia sebagai media pembelajaran dan tempat melatih skill di bidang teknologi informasi dengan menyediakan virtual machine lab yang dapat dibuat dan ...
Michael Putra Kusuma, Nur Rohman Rosyid
doaj   +1 more source

Influence of Hub Parameters on Joining Forces and Torque Transmission Output of Plastically-Joined Shaft-Hub-Connections with a Knurled Contact Surface

open access: yesMachines, 2018
A knurled interference fit is a machine part connection made by a plastic joining, which includes the advantages of commonly-used shaft-hub-connections. The combination of the friction and form fit, which are responsible for torque transmission, results ...
Lukáš Suchý   +3 more
doaj   +1 more source

Screen-Cam Robust Image Watermarking with Feature-Based Synchronization

open access: yesApplied Sciences, 2020
The screen-cam process, which is taking pictures of the content displayed on a screen with mobile phones or cameras, is one of the main ways that image information is leaked. However, traditional image watermarking methods are not resilient to screen-cam
Weitong Chen   +5 more
doaj   +1 more source

Design methodology for smart actuator services for machine tool and machining control and monitoring [PDF]

open access: yes, 2011
This paper presents a methodology to design the services of smart actuators for machine tools. The smart actuators aim at replacing the traditional drives (spindles and feed-drives) and enable to add data processing abilities to implement monitoring and ...
Archimède, Bernard   +2 more
core   +3 more sources

Design of Monitoring Framework for Malicious Hidden Process on CloudStack [PDF]

open access: yesJisuanji gongcheng, 2016
Most cloud platforms like CloudStack have no safety plug-in or function to protect the virtual machines.Aiming at this problem,this paper proposes a monitoring framework for malicious hidden process based on Xen virtual machine monitor on CloudStack ...
CUI Jingsong,TIAN Changyou,GUO Chi,YIN Xue
doaj   +1 more source

Bespoke Virtual Machine Orchestrator: An Approach for Constructing and Reconfiguring Bespoke Virtual Machine in Private Cloud Environment

open access: yesApplied Sciences, 2023
A cloud-computing company or user must create a virtual machine to build and operate a cloud environment. With the growth of cloud computing, it is necessary to build virtual machines that reflect the needs of both companies and users.
Joonseok Park   +2 more
doaj   +1 more source

Ligand-based virtual screening using binary kernel discrimination [PDF]

open access: yes, 2005
This paper discusses the use of a machine-learning technique called binary kernel discrimination (BKD) for virtual screening in drug- and pesticide-discovery programmes.
Beining Chen   +14 more
core   +1 more source

The RDF virtual machine [PDF]

open access: yesKnowledge-Based Systems, 2011
The Resource Description Framework (RDF) is a semantic network data model that is used to create machine-understandable descriptions of the world and is the basis of the Semantic Web. This article discusses the application of RDF to the representation of computer software and virtual computing machines.
openaire   +2 more sources

Resource virtualisation of network routers [PDF]

open access: yes, 2006
There is now considerable interest in applications that transport time-sensitive data across the best-effort Internet. We present a novel network router architecture, which has the potential to improve the Quality of Service guarantees provided to such ...
McIlroy, R., Sventek, J.S.
core   +1 more source

Home - About - Disclaimer - Privacy