Results 41 to 50 of about 38,506 (280)
Automatic Generation of Simulators for Processors Enhanced for Security in Virtualization
All new computer architectures need to be performance evaluated for acceptance and simulation is the most widely used method for evaluation of new processor designs.
Swapneel C. Mhatre, Priya Chandran
doaj +1 more source
The Study and Evaluation of ARM-Based Mobile Virtualization
In common sense, virtualization technology is adopted to offer several isolated execution environments and make better use of computational resources in server environment.
Lei Xu, Zonghui Wang, Wenzhi Chen
doaj +1 more source
Overview of research on trusted attestation technology of cloud virtualization platform
With the rapid development of cloud computing, the security issues of cloud platforms have also attracted much attention.Trusted computing is an essential supporting technology in the cloud computing security system.Trusted attestation is an important ...
Bibo TU +4 more
doaj +2 more sources
HVSTO: Efficient Privacy Preserving Hybrid Storage in Cloud Data Center
In cloud data center, shared storage with good management is a main structure used for the storage of virtual machines (VM). In this paper, we proposed Hybrid VM storage (HVSTO), a privacy preserving shared storage system designed for the virtual machine
Dong, Mianxiong +3 more
core +1 more source
Phase Field Failure Modeling: Brittle‐Ductile Dual‐Phase Microstructures under Compressive Loading
The approach by Amor and the approach by Miehe and Zhang for asymmetric damage behavior in the phase field method for fracture are compared regarding their fitness for microcrack‐based failure modeling. The comparison is performed for the case of a dual‐phase microstructure with a brittle and a ductile constituent.
Jakob Huber, Jan Torgersen, Ewald Werner
wiley +1 more source
Virtualization as a way to increase DNS protection against cyber threats
Domain Name System (DNS) serves as a vital Internet component, which converts friendly domain names into their corresponding computer language IP addresses.
Alaa Abdul Ridha Abdulqader Karkhi
doaj +1 more source
Securing Virtualized Datacenters
Virtualization is a very popular solution to many problems in datacenter management. It offers increased utilization of existing system resources through effective consolidation, negating the need for more servers and additional rack space. Furthermore, it offers essential capabilities in terms of disaster recovery and potential savings on energy and ...
Mirzoev, Dr. Timur, Yang, Dr. Baijian
openaire +2 more sources
Classification of Existing Virtualization Methods Used in Telecommunication Networks
This article studies the existing methods of virtualization of different resources. The positive and negative aspects of each of the methods are analyzed, the perspectivity of the approach is noted.
Ageyev, Dmytro +3 more
core +1 more source
Imaging of Biphoton States: Fundamentals and Applications
Quantum states of two photons exhibit a rich polarization and spatial structure, which provides a fundamental resource of strongly correlated and entangled states. This review analyzes the physics of these intriguing properties and explores the various techniques and technologies available to measure them, including the state of the art of their ...
Alessio D'Errico, Ebrahim Karimi
wiley +1 more source
Virtual Prototyping for Modern Internet-of-Things Applications: A Survey
Modern technological industries fused with the Internet-of-Things (IoT) have been advancing rapidly. The joint usage of several technologies has led to the reshaping of the modeling and simulation techniques into the virtualization of physical systems ...
Md Rafiul Kabir, Sandip Ray
doaj +1 more source

