Sciweavers

137 search results - page 10 / 28
» Justifying Integrity Using a Virtual Machine Verifier
Sort
View
DATE
2010
IEEE
156views Hardware» more  DATE 2010»
14 years 19 days ago
Non-intrusive virtualization management using libvirt
—The success of server virtualization has let to the deployment of a huge number of virtual machines in today’s data centers, making a manual virtualization management very lab...
Matthias Bolte, Michael Sievers, Georg Birkenheuer...
PDP
2010
IEEE
13 years 6 months ago
FTDS: Adjusting Virtual Computing Resources in Threshing Cases
—In the virtual execution environment, dynamic computing resource adjustment technique, configuring the computing resource of virtual machines automatically according to the actu...
Jian Huang, Hai Jin, Kan Hu, Zhiyuan Shao
ESCIENCE
2006
IEEE
14 years 1 months ago
Practical Fault-Tolerant Framework for eScience Infrastructure
Many areas of science currently use computing resources as a important part of their research, and many research groups adopt cluster architecture to use them efficiently and mana...
Hyuck Han, Jai Wug Kim, Jongpil Lee, Youngjin Yu, ...
RAID
2010
Springer
13 years 5 months ago
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementati...
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kem...
VRST
2006
ACM
14 years 1 months ago
The benefits of third-person perspective in virtual and augmented reality?
Instead of the reality in which you can see your own limbs, in virtual reality simulations it is sometimes disturbing not to be able to see your own body. It seems to create an is...
Patrick Salamin, Daniel Thalmann, Fréd&eacu...