Results 121 to 130 of about 17,798 (178)

Pathways, outputs and impact of NIH-supported bioinformatics and genomics graduate trainees in Africa. [PDF]

open access: yesBrief Bioinform
Jjingo D   +66 more
europepmc   +1 more source
Some of the next articles are maybe not open access.

Related searches:

Virtual Machine Introspection in Virtualization: A Security Perspective

2021 Thirteenth International Conference on Contemporary Computing (IC3-2021), 2021
Virtualization technology has gained enough attention in several fields such as Cloud Computing, the Internet of Things (IoT), and software defined networking (SDN), etc. However, security issues in virtualization impose several questions on the adoption of this technology and raise strong security concerns.
Divya Kapil, Preeti Mishra
openaire   +1 more source

Efficient Checkpointing of Virtual Machines Using Virtual Machine Introspection

2014 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, 2014
Cloud Computing environments rely heavily on system-level virtualization. This is due to the inherent benefits of virtualization including fault tolerance through checkpoint/restart (C/R) mechanisms. Because clouds are the abstraction of large datacenters and large datacenters have a higher potential for failure, it is imperative that a C/R mechanism ...
Ferrol Aderholdt   +3 more
openaire   +1 more source

Virtual Machine Introspection: Observation or Interference?

IEEE Security & Privacy Magazine, 2008
As virtualization becomes increasingly mainstream, virtual machine introspection techniques and tools are evolving to monitor VM behavior. A survey of existing approaches highlights key requirements, which are addressed by a new tool suite for the Xen VM monitoring system.
Kara Nance, Matt Bishop, Brian Hay
openaire   +1 more source

Home - About - Disclaimer - Privacy