Results 21 to 30 of about 4,567,161 (224)
SEVered: Subverting AMD's Virtual Machine Encryption [PDF]
AMD SEV is a hardware feature designed for the secure encryption of virtual machines. SEV aims to protect virtual machine memory not only from other malicious guests and physical attackers, but also from a possibly malicious hypervisor.
M. Morbitzer +3 more
semanticscholar +1 more source
Pengembangan Purwarupa Laboratorium Virtual Berbasis VMWare dengan Terraform
Pada tahun-tahun terakhir, Laboratorium Virtual telah semakin marak digunakan oleh organisasi di seluruh dunia sebagai media pembelajaran dan tempat melatih skill di bidang teknologi informasi dengan menyediakan virtual machine lab yang dapat dibuat dan ...
Michael Putra Kusuma, Nur Rohman Rosyid
doaj +1 more source
A knurled interference fit is a machine part connection made by a plastic joining, which includes the advantages of commonly-used shaft-hub-connections. The combination of the friction and form fit, which are responsible for torque transmission, results ...
Lukáš Suchý +3 more
doaj +1 more source
Screen-Cam Robust Image Watermarking with Feature-Based Synchronization
The screen-cam process, which is taking pictures of the content displayed on a screen with mobile phones or cameras, is one of the main ways that image information is leaked. However, traditional image watermarking methods are not resilient to screen-cam
Weitong Chen +5 more
doaj +1 more source
Design methodology for smart actuator services for machine tool and machining control and monitoring [PDF]
This paper presents a methodology to design the services of smart actuators for machine tools. The smart actuators aim at replacing the traditional drives (spindles and feed-drives) and enable to add data processing abilities to implement monitoring and ...
Archimède, Bernard +2 more
core +3 more sources
Design of Monitoring Framework for Malicious Hidden Process on CloudStack [PDF]
Most cloud platforms like CloudStack have no safety plug-in or function to protect the virtual machines.Aiming at this problem,this paper proposes a monitoring framework for malicious hidden process based on Xen virtual machine monitor on CloudStack ...
CUI Jingsong,TIAN Changyou,GUO Chi,YIN Xue
doaj +1 more source
A cloud-computing company or user must create a virtual machine to build and operate a cloud environment. With the growth of cloud computing, it is necessary to build virtual machines that reflect the needs of both companies and users.
Joonseok Park +2 more
doaj +1 more source
Ligand-based virtual screening using binary kernel discrimination [PDF]
This paper discusses the use of a machine-learning technique called binary kernel discrimination (BKD) for virtual screening in drug- and pesticide-discovery programmes.
Beining Chen +14 more
core +1 more source
The Resource Description Framework (RDF) is a semantic network data model that is used to create machine-understandable descriptions of the world and is the basis of the Semantic Web. This article discusses the application of RDF to the representation of computer software and virtual computing machines.
openaire +2 more sources
Resource virtualisation of network routers [PDF]
There is now considerable interest in applications that transport time-sensitive data across the best-effort Internet. We present a novel network router architecture, which has the potential to improve the Quality of Service guarantees provided to such ...
McIlroy, R., Sventek, J.S.
core +1 more source

