Sciweavers

1234 search results - page 6 / 247
» Privacy-preserving Virtual Machine
Sort
View
ICPP
2009
IEEE
15 years 9 months ago
A Heuristic for Mapping Virtual Machines and Links in Emulation Testbeds
Distributed system emulators provide a paramount platform for testing of network protocols and distributed applications in clusters and networks of workstations. However, to allow...
Rodrigo N. Calheiros, Rajkumar Buyya, César...
ICML
1995
IEEE
15 years 6 months ago
Efficient Learning with Virtual Threshold Gates
Wolfgang Maass, Manfred K. Warmuth
124
Voted
EUROPAR
2007
Springer
15 years 8 months ago
Virtual Cluster Management with Xen
Recently, virtualization of hardware resources to run multiple instances of independent virtual machines over physical hosts has gained popularity due to an industry-wide focus on ...
Nikhil Bhatia, Jeffrey S. Vetter
IPPS
2003
IEEE
15 years 7 months ago
Reconfigurable Architecture Requirements for Co-Designed Virtual Machines
This paper addresses the physical hardware requirements necessary for a co-design hardware/software virtual machine to not only exist, but to also provide comparable performance w...
Kenneth B. Kent, Micaela Serra
140
Voted
JVM
2004
133views Education» more  JVM 2004»
15 years 3 months ago
Towards Virtual Networks for Virtual Machine Grid Computing
Virtual machines can greatly simplify wide-area discomputing by lowering the level of abstraction to the benefit of both resource providers and users. Networking, however, can be ...
Ananth I. Sundararaj, Peter A. Dinda