Academic literature on the topic 'Computer virtualization'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer virtualization.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer virtualization"

1

Soni, Soni, Abdurrahman Abdurrahman, and Afdhil Hafid. "OPTIMALISASI SUMBER DAYA KOMPUTER DENGAN VIRTUALISASI SERVER MENGGUNAKAN PROXMOX VE." JURNAL FASILKOM 9, no. 2 (August 11, 2019): 369–76. http://dx.doi.org/10.37859/jf.v9i2.1394.

Full text
Abstract:
Virtualization technology is a topic that began to be scrutinized by researchers. This is inseparable from the technology's ability to reduce the cost of providing infrastructure and operations independently for each service to be served. With server virtualization, we can make several computers into one, which used to be possible for server computers to have three physical computers that can be used as one for the three server computers which in fact the resources on a single physical server computer will not use all the resources in one single physical computer. The existence of proxmox, then all servers can be connected in a network together so that they are able to streamline time. In addition, Proxmox has a web console that can be used for various purposes in server virtualization and maintenance. In this study, the performance of server virtualization using ProxmoxVE will be examined. This study is intended to determine the load of memory usage, load the CPU when running all the servers in Proxmox, and examine the Throughput, PacketLoss, Delay and Jitter on the server. Keyword: Proxmox, Virtualization, Resources, Server, Operating System
APA, Harvard, Vancouver, ISO, and other styles
2

Kotsovinos, Evangelos. "Virtualization." Communications of the ACM 54, no. 1 (January 2011): 61–65. http://dx.doi.org/10.1145/1866739.1866754.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Douglis, Fred, and Orran Krieger. "Virtualization." IEEE Internet Computing 17, no. 2 (March 2013): 6–9. http://dx.doi.org/10.1109/mic.2013.42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sudyana, Didik, Reza Tanujiwa Putra, and Soni Soni. "Digital Forensics Investigation on Proxmox Server Virtualization Using SNI 27037:2014." Sinkron 3, no. 2 (March 9, 2019): 67–72. http://dx.doi.org/10.33395/sinkron.v3i2.10029.

Full text
Abstract:
Server virtualization technology has experienced significant development so that more and more industries are adopting this technology. By using server virtualization, the industry can make savings in purchasing new servers and maintenance because virtualization allows one server to run with multiple operating systems at once. The high level of use of virtualization raises a gap for the occurrence of computer crimes involving virtualization. When computer crimes occur on virtualization, it is necessary to conduct digital forensic investigations to find useful clues in solving crime cases. Therefore, in this study a digital forensic investigation was conducted on Proxmox server virtualization by acquiring the entire storage virtualization media and carrying out checks on the results of the acquisition. Based on the investigation carried out, the acquisition technique by acquiring the entire storage media on Proxmox cannot be used because the structure of the evidence files and folders cannot be read perfectly
APA, Harvard, Vancouver, ISO, and other styles
5

Burcea, Ioana, Stephen Somogyi, Andreas Moshovos, and Babak Falsafi. "Predictor virtualization." ACM SIGPLAN Notices 43, no. 3 (March 25, 2008): 157–67. http://dx.doi.org/10.1145/1353536.1346301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lv, Hui, Yaozu Dong, Jiangang Duan, and Kevin Tian. "Virtualization challenges." ACM SIGPLAN Notices 47, no. 7 (September 5, 2012): 15–26. http://dx.doi.org/10.1145/2365864.2151030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Duport, Francois, Anteo Smerieri, Akram Akrout, Marc Haelterman, and Serge Massar. "Virtualization of a Photonic Reservoir Computer." Journal of Lightwave Technology 34, no. 9 (May 1, 2016): 2085–91. http://dx.doi.org/10.1109/jlt.2016.2524559.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Spirin, Oleg M., and Olena S. Holovnia. "ЗАСТОСУВАННЯ ТЕХНОЛОГІЙ ВІРТУАЛІЗАЦІЇ UNIX-ПОДІБНИХ ОПЕРАЦІЙНИХ СИСТЕМ У ПІДГОТОВЦІ БАКАЛАВРІВ ІНФОРМАТИКИ." Information Technologies and Learning Tools 65, no. 3 (July 1, 2018): 201. http://dx.doi.org/10.33407/itlt.v65i3.2055.

Full text
Abstract:
Despite the widespread use of virtualization technologies in education the problem of individual selection of virtualization tools for teaching certain courses, including teaching operating systems to Bachelors of Computer Science, remains scarcely studied. Research of operating systems teaching process to Bachelors of Computer Science found a range of issues in using virtualization technologies. These are as listed: hardware and software failures; low performance of virtualized operating systems; lack of adapted instructions; dependence on specific computer laboratories; unequal conditions of independent work with virtualized operating systems. Comparison of Bachelors of Computer Science scores in Operating Systems course which included studying Linux and Windows operating systems and also Fundamentals of Operating Systems Theory, resulted in general lower level of learning outcomes in Linux compared to the ones of the entire academic subject. A survey of Ukrainian teachers of Operating Systems course shows a number of differences in teaching process. It includes differences in teachers’ experience of using virtualization technologies, variety of virtualization technologies applied during the course, factors estimation for selecting virtualization tools. The article proposes the methodology of using unix-like operating systems virtualization technologies in professional training of Bachelors of Computer Science based on the variable approach to using mentioned technologies. The approach involves combining several virtualization tools in the frames of one course of Operating Systems to meet specific features of teaching the course as well as individual students’ needs and ensures hardware and software fault tolerance. Didactic model underlying the proposed methodology is described in the article. Experimental results on methodology effectiveness are provided.
APA, Harvard, Vancouver, ISO, and other styles
9

Song, Meng Hua. "Analysis of Risks for Virtualization Technology." Applied Mechanics and Materials 539 (July 2014): 374–77. http://dx.doi.org/10.4028/www.scientific.net/amm.539.374.

Full text
Abstract:
In IT field, the application of the virtualization technology has expanded the capacity of computer hardware, simplified the software configuration process, and simulated the parallel operation of multiple CPUs. Such technology can achieve multiple operating systems running one platform at the same time, and improve the work efficiency of the computer. In the application of the virtualization technology, there are various conditions to cause risks, such as security, high resource utilization, disunited virtualization technology standards, expectation for cost reduction, changes in management mode and application migration, etc. For the risk existing in the application of the technology, the author puts forward the specific countermeasures, benefiting the abatement or elimination of risk of virtualization technology application, thus to ensure the purpose of applying such technology. This paper mainly analyzes the target the risk of virtualization technology application and puts forward the specific measures for reducing the risk of the virtualization technology application, in order to facilitate the practical application and development of the virtualization technology.
APA, Harvard, Vancouver, ISO, and other styles
10

V. Anbazhagu, U., P. Maheshwaran, K. S. Archana, and Sheela Gowr. "A study on competence and enrichment of virtualization in cloud computing." International Journal of Engineering & Technology 7, no. 2.21 (April 20, 2018): 345. http://dx.doi.org/10.14419/ijet.v7i2.21.12401.

Full text
Abstract:
The aim of this research is to study and enhance the applications of most profitable technology in cloud computing ever "Virtualization". Back then, a 15 years before, nobody knows about the technology named cloud computing exists. But now, every technology such as personal computer, mobile phone, tablet PC, even televisions rely on cloud computing. Cloud computing helps greatly in reducing costs, scalability and flexibility in computer services. Virtualization is the technology that helps cloud computing to emerge in a large profitable level. Using virtualization (such as server, network and storage virtualization technologies), the resource cost is reduced in great level.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Computer virtualization"

1

Southern, Gabriel. "Symmetric multiprocessing virtualization." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3225.

Full text
Abstract:
Thesis (M.S.)--George Mason University, 2008.
Vita: p. 77. Thesis director: David Hwang. Submitted in partial fulfillment of the requirements for the degree of Master of Science in Computer Engineering. Title from PDF t.p. (viewed Aug. 28, 20088). Includes bibliographical references (p. 73-76). Also issued in print.
APA, Harvard, Vancouver, ISO, and other styles
2

Pelletingeas, Christophe. "Performance evaluation of virtualization with cloud computing." Thesis, Edinburgh Napier University, 2010. http://researchrepository.napier.ac.uk/Output/4010.

Full text
Abstract:
Cloud computing has been the subject of many researches. Researches shows that cloud computing permit to reduce hardware cost, reduce the energy consumption and allow a more efficient use of servers. Nowadays lot of servers are used inefficiently because they are underutilized. The uses of cloud computing associate to virtualization have been a solution to the underutilisation of those servers. However the virtualization performances with cloud computing cannot offers performances equal to the native performances. The aim of this project was to study the performances of the virtualization with cloud computing. To be able to meet this aim it has been review at first the previous researches on this area. It has been outline the different types of cloud toolkit as well as the different ways available to virtualize machines. In addition to that it has been examined open source solutions available to implement a private cloud. The findings of the literature review have been used to realize the design of the different experiments and also in the choice the tools used to implement a private cloud. In the design and the implementation it has been setup experiment to evaluate the performances of public and private cloud. The results obtains through those experiments have outline the performances of public cloud and shows that the virtualization of Linux gives better performances than the virtualization of Windows. This is explained by the fact that Linux is using paravitualization while Windows is using HVM. The evaluation of performances on the private cloud has permitted the comparison of native performance with paravirtualization and HVM. It has been seen that paravirtualization hasperformances really close to the native performances contrary to HVM. Finally it hasbeen presented the cost of the different solutions and their advantages.
APA, Harvard, Vancouver, ISO, and other styles
3

Koppe, Jason. "Differential virtualization for large-scale system modeling /." Online version of thesis, 2008. http://hdl.handle.net/1850/7543.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pham, Duy M. "Performance comparison between x86 virtualization technologies." Thesis, California State University, Long Beach, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1528024.

Full text
Abstract:

In computing, virtualization provides the capability to service users with different resource requirements and operating system platform needs on a single host computer system. The potential benefits of virtualization include efficient resource utilization, flexible service offering, as well as scalable system planning and expansion, all desirable whether it is for enterprise level data centers, personal computing, or anything in between. These benefits, however, involve certain costs of performance degradation. This thesis compares the performance costs between two of the most popular and widely-used x86 CPU-based virtualization technologies today in personal computing. The results should be useful for users when determining which virtualization technology to adopt for their particular computing needs.

APA, Harvard, Vancouver, ISO, and other styles
5

Jensen, Deron Eugene. "System-wide Performance Analysis for Virtualization." PDXScholar, 2014. https://pdxscholar.library.pdx.edu/open_access_etds/1789.

Full text
Abstract:
With the current trend in cloud computing and virtualization, more organizations are moving their systems from a physical host to a virtual server. Although this can significantly reduce hardware, power, and administration costs, it can increase the cost of analyzing performance problems. With virtualization, there is an initial performance overhead, and as more virtual machines are added to a physical host the interference increases between various guest machines. When this interference occurs, a virtualized guest application may not perform as expected. There is little or no information to the virtual OS about the interference, and the current performance tools in the guest are unable to show this interference. We examine the interference that has been shown in previous research, and relate that to existing tools and research in root cause analysis. We show that in virtualization there are additional layers which need to be analyzed, and design a framework to determine if degradation is occurring from an external virtualization layer. Additionally, we build a virtualization test suite with Xen and PostgreSQL and run multiple tests to create I/O interference. We show that our method can distinguish between a problem caused by interference from external systems and a problem from within the virtual guest.
APA, Harvard, Vancouver, ISO, and other styles
6

Narayanan, Sivaramakrishnan. "Efficient Virtualization of Scientific Data." The Ohio State University, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=osu1221079391.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Johansson, Marcus, and Lukas Olsson. "Comparative evaluation of virtualization technologies in the cloud." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-49242.

Full text
Abstract:
The cloud has over the years become a staple of the IT industry, not only for storage purposes, but for services, platforms and infrastructures. A key component of the cloud is virtualization and the fluidity it makes possible, allowing resources to be utilized more efficiently and services to be relocated more easily when needed. Virtual machine technology, consisting of a hypervisor managing several guest systems has been the method for achieving this virtualization, but container technology, a lightweight virtualization method running directly on the host without a classic hypervisor, has been making headway in recent years. This report investigates the differences between VM’s (Virtual Machines) and containers, comparing the two in relevant areas. The software chosen for this comparison are KVM as VM hypervisor, and Docker as container platform, both run on Linux as the underlying host system. The work conducted for this report compares efficiency in common use areas through experimental evidence, and also evaluates differences in design through study of relevant literature. The results are then discussed and weighed to provide a conclusion. The results of this work shows that Docker has the capability to potentially take over the role as the main virtualization technology in the coming years, providing some of its current shortcomings are addressed and improved upon.
APA, Harvard, Vancouver, ISO, and other styles
8

Athreya, Manoj B. "Subverting Linux on-the-fly using hardware virtualization technology." Thesis, Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/34844.

Full text
Abstract:
In this thesis, we address the problem faced by modern operating systems due to the exploitation of Hardware-Assisted Full-Virtualization technology by attackers. Virtualization technology has been of growing importance these days. With the help of such a technology, multiple operating systems can be run on a single piece of hardware, with little or no modification to the operating system. Both Intel and AMD have contributed to x86 full-virtualization through their respective instruction set architectures. Hardware virtualization extensions can be found in almost all x86 processors these days. Hardware virtualization technologies have opened a whole new frontier for a new kind of attack. A system hacker can abuse hardware virualization technology to gain control over an operating system on-the-fly (i.e., without a system restart) by installing a thin Virtual Machine Monitor (VMM) below the native operating system. Such a VMM based malware is termed a Hardware-Assisted Virtual Machine (HVM) rootkit. We discuss the technique used by a rootkit named Blue Pill to subvert the Windows Vista operating system by exploiting the AMD-V (codenamed "Pacifica") virtualization extensions. HVM rootkits do not hook any operating system code or data regions; hence detecting the existence of such malware using conventional techniques becomes extremely difficult. This thesis discusses existing methods to detect such rootkits and their inefficiencies. In this work, we implement a proof-of-concept HVM rootkit using Intel-VT hardware virtualization technology and also discuss how such an attack can be defended against by using an autonomic architecture called SHARK, which was proposed by Vikas et al., in MICRO 2008.
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Wei. "Light-Weight Virtualization Driven Runtimes for Big Data Applications." Thesis, University of Colorado Colorado Springs, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13862451.

Full text
Abstract:

Datacenters are evolving to host heterogeneous Big Data workloads on shared clusters to reduce the operational cost and achieve higher resource utilization. However, it is challenging to schedule heterogeneous workloads with diverse resource requirements and QoS constraints. For example, when consolidating latency critical jobs and best-effort batch jobs in the same cluster, latency critical jobs may suffer from long queuing delay if their resource requests cannot be met immediately; while best-effort jobs would suffer from killing overhead when preempted. Moreover, resource contention may harm task performance running on worker nodes. Since resource requirements for diverse applications show heterogeneity and is not known before task execution, either the cluster manager has to over-provision resources for all incoming applications resulting in low cluster utilization; or applications may experience performance slowdown or even failure due to resource insufficiency. Existing approaches focus on either application awareness or system awareness and fail to address the semantic gap between the application layer and the system layer (e.g., OS scheduling mechanisms or cloud resource allocators).

To address these issues, we propose to attack these problems from a different angle. In other words, applications and underlying systems should cooperate synergistically. This this way, the resource demands of application can be exposed to the system. At the same time, application schedulers can be assisted with more runtimes of the system layer and perform more dedicated scheduling. However, the system and application co-design is challenging. First, the real resource demands for an application is hard to be predicted since its requirements vary during its lifetime. Second, there are tons of information generated from system layers (e.g., OS process schedulers or hardware counters), from which it is hard to associate these information to a dedicated task. Fortunately, with the help of lightweight virtualization, applications could run in isolated containers such that system level runtime information can be collected at the container level. The rich APIs of container based virtualization also enable to perform more advanced scheduling.

In this thesis, we focus on efficient and scalable techniques in datacenter scheduling by leveraging lightweight virtualization. Our thesis is two folds. First, we focus on profiling and optimizing the performance of Big Data applications. In this aspect, we built a tool to trace the scheduling delay for low-latency online data analytics workloads. We further built a map execution engine to address the performance heterogeneity for MapReduce. Second, we focus on leveraging OS containers to build advanced cluster scheduling mechanisms. In that, we built a preemptive cluster scheduler, an elastic memory manager and an OOM killer for Big Data applications. We also conducted a supplementary research on tracing the performance of Big Data training on TensorFlow.

We conducted extensive evaluations of the proposed projects in a real-world cluster. The experimental results demonstrate the effectiveness of proposed approaches in terms of improving performance and utilization of Big Data clusters.

APA, Harvard, Vancouver, ISO, and other styles
10

WENG, LI. "Automatic and efficient data virtualization system for scientific datasets." The Ohio State University, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=osu1154717945.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Computer virtualization"

1

Ruest, Danielle. Virtualization. New York: McGraw-Hill, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

1971-, Newman Amy, ed. Practical virtualization solutions: Virtualization from the trenches. Upper Saddle River, NJ: Prentice Hall/Pearson Education, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hess, Kenneth. Practical virtualization solutions: Virtualization from the trenches. Upper Saddle River, NJ: Prentice Hall/Pearson Education, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hess, Kenneth. Practical virtualization solutions: Virtualization from the trenches. Upper Saddle River, NJ: Prentice Hall, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mastering Microsoft virtualization. Indianapolis, Ind: Wiley Pub., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Virtualization for dummies. Hoboken, N.J: Wiley, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Golden, Bernard. Virtualization for dummies. Hoboken, N.J: Wiley, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hagen, William Von. Professional Xen Virtualization. New York: John Wiley & Sons, Ltd., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Babette, Haeusser, and International Business Machines Corporation. International Technical Support Organization., eds. IBM Virtualization engine TS7700: Tape virtualization for System Z servers. 2nd ed. [Poughkeepsie, N.Y.]: International Technical Support Organization, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Golden, Bernard. Virtualization for dummies. Hoboken, N.J: Wiley, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Computer virtualization"

1

Kizza, Joseph Migga. "Virtualization Security." In Guide to Computer Network Security, 473–90. London: Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Angepat, Hari, Derek Chiou, Eric S. Chung, and James C. Hoe. "Simulation Virtualization." In FPGA-Accelerated Simulation of Computer Systems, 31–44. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-031-01744-5_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kizza, Joseph Migga. "Virtualization Technology and Security." In Texts in Computer Science, 459–76. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38141-7_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kizza, Joseph Migga. "Virtualization Technology and Security." In Guide to Computer Network Security, 457–75. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kazim, Muhammad, and Shao Ying Zhu. "Virtualization Security in Cloud Computing." In Computer Communications and Networks, 51–63. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25988-8_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Chen, Zhuyun Qi, Yirui Liu, and Kai Lei. "Using Virtualization for Blockchain Testing." In Lecture Notes in Computer Science, 289–99. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-73830-7_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Xiaolin, Lingmei Weng, Zhenlin Wang, and Yingwei Luo. "Towards Eliminating Memory Virtualization Overhead." In Lecture Notes in Computer Science, 295–306. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-45293-2_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Johanssen, Michael. "Update on System Virtualization Management." In Communications in Computer and Information Science, 125–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88708-9_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Loganayagi, B., and S. Sujatha. "Improving Cloud Security through Virtualization." In Communications in Computer and Information Science, 442–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24043-0_45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Danciu, Vitalian A., and Martin G. Metzker. "On I/O Virtualization Management." In Communications in Computer and Information Science, 75–86. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14944-3_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer virtualization"

1

Arslan, Ibrahim, and Izzet Gokhan Ozbilgin. "Virtualization and security: Examination of a virtualization platform structure." In 2017 International Conference on Computer Science and Engineering (UBMK). IEEE, 2017. http://dx.doi.org/10.1109/ubmk.2017.8093379.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Alaluna, Max, Nuno Neves, and Fernando M. V. Ramos. "Elastic Network Virtualization." In IEEE INFOCOM 2020 - IEEE Conference on Computer Communications. IEEE, 2020. http://dx.doi.org/10.1109/infocom41043.2020.9155287.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"Application of Virtualization Technology in Computer Experiments." In 2017 International Conference on Materials, Energy, Civil Engineering and Computer. Francis Academic Press, 2017. http://dx.doi.org/10.25236/matecc.2017.21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tsao, Po-Jui, Yi-Feng Sun, Li-Han Chen, and Chuan-Yu Cho. "Efficient Virtualization-Based Fault Tolerance." In 2016 International Computer Symposium (ICS). IEEE, 2016. http://dx.doi.org/10.1109/ics.2016.0031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

AbdElRahem, Omnia, Ayman M. Bahaa-Eldin, and Ayman Taha. "Virtualization security: A survey." In 2016 11th International Conference on Computer Engineering & Systems (ICCES). IEEE, 2016. http://dx.doi.org/10.1109/icces.2016.7821971.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Volpano, Dennis. "Modular network function virtualization." In 2017 IEEE Conference on Computer Communications: Workshops (INFOCOM WKSHPS). IEEE, 2017. http://dx.doi.org/10.1109/infcomw.2017.8116499.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zacharov, I., O. Panarin, E. Ryabinkin, K. Izotov, and A. Teslyuk. "Virtualization for Scientific Workload." In 2018 International Scientific and Technical Conference Modern Computer Network Technologies (MoNeTeC). IEEE, 2018. http://dx.doi.org/10.1109/monetec.2018.8572238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Reeser, Jon, Thomas Jankowski, and Greg M. Kemper. "Maintaining HMI and SCADA systems through computer virtualization." In 2014 IEEE-IAS/PCA Cement Industry Technical Conference. IEEE, 2014. http://dx.doi.org/10.1109/citcon.2014.6820114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sayed, Suzan M., Shawky E. Shaaban, and El-Sayed A. M. El-Badawy. "LTE Network Virtualization Feasibility Study." In 2014 International Conference on Computer & Communication Engineering (ICCCE). IEEE, 2014. http://dx.doi.org/10.1109/iccce.2014.54.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Egi, Norbert, Adam Greenhalgh, Mark Handley, Mickael Hoerdt, Laurent Mathy, and Tim Schooley. "Evaluating Xen for Router Virtualization." In 2007 16th International Conference on Computer Communications and Networks. IEEE, 2007. http://dx.doi.org/10.1109/icccn.2007.4317993.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Computer virtualization"

1

Wheeler, Christopher. Virtualization Shares: Feasibility and Implementation in the USNA Computer Science Department. Fort Belvoir, VA: Defense Technical Information Center, March 2010. http://dx.doi.org/10.21236/ada532377.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Semerikov, Serhiy, Viacheslav Osadchyi, and Olena Kuzminska. Proceedings of the 1st Symposium on Advances in Educational Technology - Volume 2: AET. SciTePress, 2022. http://dx.doi.org/10.31812/123456789/7011.

Full text
Abstract:
Symposium on Advances in Educational Technology (AET) is a peer-reviewed international conference focusing on research advances and applications of combined use of computer hardware, software, and educational theory and practice to facilitate learning. Today, AET is the premier interdisciplinary forum for learning scientists, academicians, researchers, professionals, policymakers, postgraduate students, and practitioners to present their latest research results, ideas, developments, and applications. AET topics of interest are: • Artificial intelligence in education • Augmented reality in education • Cloud-based learning environments • Cloud technologies for mathematics learning • Cloud technologies for informatics learning • Computer simulation in science and mathematics learning • ICT in primary and secondary education • ICT in higher education • Learning environments • Learning technology • Professional training in the digital space • Massive open online courses • Methodology of informatization in education • Modelling systems in education • Psychological safety in the digital educational environment • Soft skills development • STEM education • Virtualization of learning This volume represents the proceedings of the Symposium on Advances in Educational Technology, held in Kyiv, Ukraine, on November 12-13, 2020. It comprises 110 contributed papers that were carefully peer-reviewed and selected from 282 submissions. Each submission was reviewed by at least 3, and on the average 3.1, program committee members. The accepted papers present a state-of-the-art overview of successful cases and provide guidelines for future research. We are thankful to all the authors who submitted papers and the delegates for their participation and their interest in AET as a platform to share their ideas and innovation. Also, we are also thankful to all the program committee members for providing continuous guidance and efforts taken by peer reviewers contributed to improve the quality of papers provided constructive critical comments, improvements and corrections to the authors are gratefully appreciated for their contribution to the success of the workshop. Moreover, we would like to thank the developers of HotCRP, who made it possible for us to use the resources of this excellent and comprehensive conference management system, from the call of papers and inviting reviewers, to handling paper submissions, communicating with the authors, and creating the volume of the workshop proceedings.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography