Results 31 to 40 of about 17,798 (178)
Trusted auditing method of virtual machine based on improved expectation decision method
Whether the cloud computing environment is credible is the key factor in the promotion and effective use of cloud computing.For this reason,the expected value decision method in risk decision-making was improved.The usage scenarios was redefined,the cost
Junfeng TIAN, Yongchao ZHANG
doaj +2 more sources
What am I? Virtual Machines and the Mind/Body Problem [PDF]
When your word processor or email program is running on your computer, this creates a "virtual machine” that manipulates windows, files, text, etc. What is this virtual machine, and what are the virtual objects it manipulates?
Pollock, John
core
Human Capital 4.0: Readiness of Initial Vocational Education Programmes in Italy and Germany
ABSTRACT The rapid pace of technological innovation and the advent of Industry 4.0 have profoundly transformed labour markets and the nature of work. This paper examines the preparedness of Initial Vocational Education and Training (IVET) programmes in Germany and Italy to meet the demands of Human Capital 4.0. Utilising a comparative analysis of three
Luca Antonazzo, Susanne Peters
wiley +1 more source
VMI-PL: A monitoring language for virtual platforms using virtual machine introspection
With the growth of virtualization and cloud computing, more and more forensic investigations rely on being able to perform live forensics on a virtual machine using virtual machine introspection (VMI). Inspecting a virtual machine through its hypervisor enables investigation without risking contamination of the evidence, crashing the computer, etc.
Westphal, Florian +3 more
openaire +3 more sources
Virtual Machine Introspection (VMI) is a powerful technology used to detect and analyze malicious software inside Virtual Machines (VMs) from the outside.
Lukas Beierlieb +4 more
doaj +1 more source
AI Alignment Versus AI Ethical Treatment: 10 Challenges
ABSTRACT A morally acceptable course of AI development should avoid two dangers: creating unaligned AI systems that pose a threat to humanity and mistreating AI systems that merit moral consideration in their own right. This paper argues these two dangers interact and that if we create AI systems that merit moral consideration, simultaneously avoiding ...
Adam Bradley, Bradford Saad
wiley +1 more source
A Chequered History but Positive Future for British Public Administration
ABSTRACT Public services, public servants, and the study of Public Administration are operating in a context of global turbulence. Our review of the state of the discipline suggests that a core strength of British Public Administration has been the complementarity between scholarship and practice, responding to existential threats.
Ian C. Elliott +7 more
wiley +1 more source
Model of runtime memory leak detection based on the virtual machine introspection
Virtualization technology has been widely used in the field of cloud computing and data center, and it is an important way to improve reliability of system under the virtual computing environment using runtime memory leak de-tecting to eliminate memory ...
Ru-liang XIAO +5 more
doaj +2 more sources
Scientific requirements for an engineered model of consciousness [PDF]
The building of a non-natural conscious system requires more than the design of physical or virtual machines with intuitively conceived abilities, philosophically elucidated architecture or hardware homologous to an animal’s brain.
Booth, David A.
core
Computer‐Assisted Performance‐Based Assessment for Mental Health: A Scoping Review
ABSTRACT Adolescent mental health is foundational to personal development, yet it faces escalating challenges globally. While traditional assessment methods lack objectivity and ecological validity, integrating computer‐assisted technology (CAT) into performance‐based assessments (PBAs) offers a promising pathway.
Hanya Li, Shuang Li
wiley +1 more source

