Sciweavers

1683 search results - page 5 / 337
» Testing system virtual machines
Sort
View
SISW
2005
IEEE
14 years 27 days ago
Towards Protecting Sensitive Files in a Compromised System
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Xin Zhao, Kevin Borders, Atul Prakash
SOSP
2003
ACM
14 years 4 months ago
Xen and the art of virtualization
Numerous systems have been designed which use virtualization to subdivide the ample resources of a modern computer. Some require specialized hardware, or cannot support commodity ...
Paul Barham, Boris Dragovic, Keir Fraser, Steven H...
CLUSTER
2006
IEEE
13 years 7 months ago
Distributed File System Virtualization Techniques Supporting On-Demand Virtual Machine Environments for Grid Computing
This paper presents a data management solution which allows fast Virtual Machine (VM) instantiation and efficient run-time execution to support VMs as execution environments in Gri...
Ming Zhao 0002, Jian Zhang 0005, Renato J. O. Figu...
ICDCS
2008
IEEE
14 years 1 months ago
Crystal: An Emulation Framework for Practical Peer-to-Peer Multimedia Streaming Systems
To rapidly evolve new designs of peer-to-peer (P2P) multimedia streaming systems, it is highly desirable to test and troubleshoot them in a controlled and repeatable experimental ...
Mea Wang, Hassan Shojania, Baochun Li
ICDE
2008
IEEE
149views Database» more  ICDE 2008»
14 years 1 months ago
Database systems on virtual machines: How much do you lose?
Virtual machine technologies offer simple and practical mechanisms to address many manageability problems in database systems. For example, these technologies allow for server con...
Umar Farooq Minhas, Jitendra Yadav, Ashraf Aboulna...