Littérature scientifique sur le sujet « Computer virtualization »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Computer virtualization ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Computer virtualization"

1

Soni, Soni, Abdurrahman Abdurrahman et Afdhil Hafid. « OPTIMALISASI SUMBER DAYA KOMPUTER DENGAN VIRTUALISASI SERVER MENGGUNAKAN PROXMOX VE ». JURNAL FASILKOM 9, no 2 (11 août 2019) : 369–76. http://dx.doi.org/10.37859/jf.v9i2.1394.

Texte intégral
Résumé :
Virtualization technology is a topic that began to be scrutinized by researchers. This is inseparable from the technology's ability to reduce the cost of providing infrastructure and operations independently for each service to be served. With server virtualization, we can make several computers into one, which used to be possible for server computers to have three physical computers that can be used as one for the three server computers which in fact the resources on a single physical server computer will not use all the resources in one single physical computer. The existence of proxmox, then all servers can be connected in a network together so that they are able to streamline time. In addition, Proxmox has a web console that can be used for various purposes in server virtualization and maintenance. In this study, the performance of server virtualization using ProxmoxVE will be examined. This study is intended to determine the load of memory usage, load the CPU when running all the servers in Proxmox, and examine the Throughput, PacketLoss, Delay and Jitter on the server. Keyword: Proxmox, Virtualization, Resources, Server, Operating System
Styles APA, Harvard, Vancouver, ISO, etc.
2

Kotsovinos, Evangelos. « Virtualization ». Communications of the ACM 54, no 1 (janvier 2011) : 61–65. http://dx.doi.org/10.1145/1866739.1866754.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Douglis, Fred, et Orran Krieger. « Virtualization ». IEEE Internet Computing 17, no 2 (mars 2013) : 6–9. http://dx.doi.org/10.1109/mic.2013.42.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Sudyana, Didik, Reza Tanujiwa Putra et Soni Soni. « Digital Forensics Investigation on Proxmox Server Virtualization Using SNI 27037:2014 ». Sinkron 3, no 2 (9 mars 2019) : 67–72. http://dx.doi.org/10.33395/sinkron.v3i2.10029.

Texte intégral
Résumé :
Server virtualization technology has experienced significant development so that more and more industries are adopting this technology. By using server virtualization, the industry can make savings in purchasing new servers and maintenance because virtualization allows one server to run with multiple operating systems at once. The high level of use of virtualization raises a gap for the occurrence of computer crimes involving virtualization. When computer crimes occur on virtualization, it is necessary to conduct digital forensic investigations to find useful clues in solving crime cases. Therefore, in this study a digital forensic investigation was conducted on Proxmox server virtualization by acquiring the entire storage virtualization media and carrying out checks on the results of the acquisition. Based on the investigation carried out, the acquisition technique by acquiring the entire storage media on Proxmox cannot be used because the structure of the evidence files and folders cannot be read perfectly
Styles APA, Harvard, Vancouver, ISO, etc.
5

Burcea, Ioana, Stephen Somogyi, Andreas Moshovos et Babak Falsafi. « Predictor virtualization ». ACM SIGPLAN Notices 43, no 3 (25 mars 2008) : 157–67. http://dx.doi.org/10.1145/1353536.1346301.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Lv, Hui, Yaozu Dong, Jiangang Duan et Kevin Tian. « Virtualization challenges ». ACM SIGPLAN Notices 47, no 7 (5 septembre 2012) : 15–26. http://dx.doi.org/10.1145/2365864.2151030.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Duport, Francois, Anteo Smerieri, Akram Akrout, Marc Haelterman et Serge Massar. « Virtualization of a Photonic Reservoir Computer ». Journal of Lightwave Technology 34, no 9 (1 mai 2016) : 2085–91. http://dx.doi.org/10.1109/jlt.2016.2524559.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Spirin, Oleg M., et Olena S. Holovnia. « ЗАСТОСУВАННЯ ТЕХНОЛОГІЙ ВІРТУАЛІЗАЦІЇ UNIX-ПОДІБНИХ ОПЕРАЦІЙНИХ СИСТЕМ У ПІДГОТОВЦІ БАКАЛАВРІВ ІНФОРМАТИКИ ». Information Technologies and Learning Tools 65, no 3 (1 juillet 2018) : 201. http://dx.doi.org/10.33407/itlt.v65i3.2055.

Texte intégral
Résumé :
Despite the widespread use of virtualization technologies in education the problem of individual selection of virtualization tools for teaching certain courses, including teaching operating systems to Bachelors of Computer Science, remains scarcely studied. Research of operating systems teaching process to Bachelors of Computer Science found a range of issues in using virtualization technologies. These are as listed: hardware and software failures; low performance of virtualized operating systems; lack of adapted instructions; dependence on specific computer laboratories; unequal conditions of independent work with virtualized operating systems. Comparison of Bachelors of Computer Science scores in Operating Systems course which included studying Linux and Windows operating systems and also Fundamentals of Operating Systems Theory, resulted in general lower level of learning outcomes in Linux compared to the ones of the entire academic subject. A survey of Ukrainian teachers of Operating Systems course shows a number of differences in teaching process. It includes differences in teachers’ experience of using virtualization technologies, variety of virtualization technologies applied during the course, factors estimation for selecting virtualization tools. The article proposes the methodology of using unix-like operating systems virtualization technologies in professional training of Bachelors of Computer Science based on the variable approach to using mentioned technologies. The approach involves combining several virtualization tools in the frames of one course of Operating Systems to meet specific features of teaching the course as well as individual students’ needs and ensures hardware and software fault tolerance. Didactic model underlying the proposed methodology is described in the article. Experimental results on methodology effectiveness are provided.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Song, Meng Hua. « Analysis of Risks for Virtualization Technology ». Applied Mechanics and Materials 539 (juillet 2014) : 374–77. http://dx.doi.org/10.4028/www.scientific.net/amm.539.374.

Texte intégral
Résumé :
In IT field, the application of the virtualization technology has expanded the capacity of computer hardware, simplified the software configuration process, and simulated the parallel operation of multiple CPUs. Such technology can achieve multiple operating systems running one platform at the same time, and improve the work efficiency of the computer. In the application of the virtualization technology, there are various conditions to cause risks, such as security, high resource utilization, disunited virtualization technology standards, expectation for cost reduction, changes in management mode and application migration, etc. For the risk existing in the application of the technology, the author puts forward the specific countermeasures, benefiting the abatement or elimination of risk of virtualization technology application, thus to ensure the purpose of applying such technology. This paper mainly analyzes the target the risk of virtualization technology application and puts forward the specific measures for reducing the risk of the virtualization technology application, in order to facilitate the practical application and development of the virtualization technology.
Styles APA, Harvard, Vancouver, ISO, etc.
10

V. Anbazhagu, U., P. Maheshwaran, K. S. Archana et Sheela Gowr. « A study on competence and enrichment of virtualization in cloud computing ». International Journal of Engineering & ; Technology 7, no 2.21 (20 avril 2018) : 345. http://dx.doi.org/10.14419/ijet.v7i2.21.12401.

Texte intégral
Résumé :
The aim of this research is to study and enhance the applications of most profitable technology in cloud computing ever "Virtualization". Back then, a 15 years before, nobody knows about the technology named cloud computing exists. But now, every technology such as personal computer, mobile phone, tablet PC, even televisions rely on cloud computing. Cloud computing helps greatly in reducing costs, scalability and flexibility in computer services. Virtualization is the technology that helps cloud computing to emerge in a large profitable level. Using virtualization (such as server, network and storage virtualization technologies), the resource cost is reduced in great level.
Styles APA, Harvard, Vancouver, ISO, etc.

Thèses sur le sujet "Computer virtualization"

1

Southern, Gabriel. « Symmetric multiprocessing virtualization ». Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3225.

Texte intégral
Résumé :
Thesis (M.S.)--George Mason University, 2008.
Vita: p. 77. Thesis director: David Hwang. Submitted in partial fulfillment of the requirements for the degree of Master of Science in Computer Engineering. Title from PDF t.p. (viewed Aug. 28, 20088). Includes bibliographical references (p. 73-76). Also issued in print.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Pelletingeas, Christophe. « Performance evaluation of virtualization with cloud computing ». Thesis, Edinburgh Napier University, 2010. http://researchrepository.napier.ac.uk/Output/4010.

Texte intégral
Résumé :
Cloud computing has been the subject of many researches. Researches shows that cloud computing permit to reduce hardware cost, reduce the energy consumption and allow a more efficient use of servers. Nowadays lot of servers are used inefficiently because they are underutilized. The uses of cloud computing associate to virtualization have been a solution to the underutilisation of those servers. However the virtualization performances with cloud computing cannot offers performances equal to the native performances. The aim of this project was to study the performances of the virtualization with cloud computing. To be able to meet this aim it has been review at first the previous researches on this area. It has been outline the different types of cloud toolkit as well as the different ways available to virtualize machines. In addition to that it has been examined open source solutions available to implement a private cloud. The findings of the literature review have been used to realize the design of the different experiments and also in the choice the tools used to implement a private cloud. In the design and the implementation it has been setup experiment to evaluate the performances of public and private cloud. The results obtains through those experiments have outline the performances of public cloud and shows that the virtualization of Linux gives better performances than the virtualization of Windows. This is explained by the fact that Linux is using paravitualization while Windows is using HVM. The evaluation of performances on the private cloud has permitted the comparison of native performance with paravirtualization and HVM. It has been seen that paravirtualization hasperformances really close to the native performances contrary to HVM. Finally it hasbeen presented the cost of the different solutions and their advantages.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Koppe, Jason. « Differential virtualization for large-scale system modeling / ». Online version of thesis, 2008. http://hdl.handle.net/1850/7543.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Pham, Duy M. « Performance comparison between x86 virtualization technologies ». Thesis, California State University, Long Beach, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1528024.

Texte intégral
Résumé :

In computing, virtualization provides the capability to service users with different resource requirements and operating system platform needs on a single host computer system. The potential benefits of virtualization include efficient resource utilization, flexible service offering, as well as scalable system planning and expansion, all desirable whether it is for enterprise level data centers, personal computing, or anything in between. These benefits, however, involve certain costs of performance degradation. This thesis compares the performance costs between two of the most popular and widely-used x86 CPU-based virtualization technologies today in personal computing. The results should be useful for users when determining which virtualization technology to adopt for their particular computing needs.

Styles APA, Harvard, Vancouver, ISO, etc.
5

Jensen, Deron Eugene. « System-wide Performance Analysis for Virtualization ». PDXScholar, 2014. https://pdxscholar.library.pdx.edu/open_access_etds/1789.

Texte intégral
Résumé :
With the current trend in cloud computing and virtualization, more organizations are moving their systems from a physical host to a virtual server. Although this can significantly reduce hardware, power, and administration costs, it can increase the cost of analyzing performance problems. With virtualization, there is an initial performance overhead, and as more virtual machines are added to a physical host the interference increases between various guest machines. When this interference occurs, a virtualized guest application may not perform as expected. There is little or no information to the virtual OS about the interference, and the current performance tools in the guest are unable to show this interference. We examine the interference that has been shown in previous research, and relate that to existing tools and research in root cause analysis. We show that in virtualization there are additional layers which need to be analyzed, and design a framework to determine if degradation is occurring from an external virtualization layer. Additionally, we build a virtualization test suite with Xen and PostgreSQL and run multiple tests to create I/O interference. We show that our method can distinguish between a problem caused by interference from external systems and a problem from within the virtual guest.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Narayanan, Sivaramakrishnan. « Efficient Virtualization of Scientific Data ». The Ohio State University, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=osu1221079391.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Johansson, Marcus, et Lukas Olsson. « Comparative evaluation of virtualization technologies in the cloud ». Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-49242.

Texte intégral
Résumé :
The cloud has over the years become a staple of the IT industry, not only for storage purposes, but for services, platforms and infrastructures. A key component of the cloud is virtualization and the fluidity it makes possible, allowing resources to be utilized more efficiently and services to be relocated more easily when needed. Virtual machine technology, consisting of a hypervisor managing several guest systems has been the method for achieving this virtualization, but container technology, a lightweight virtualization method running directly on the host without a classic hypervisor, has been making headway in recent years. This report investigates the differences between VM’s (Virtual Machines) and containers, comparing the two in relevant areas. The software chosen for this comparison are KVM as VM hypervisor, and Docker as container platform, both run on Linux as the underlying host system. The work conducted for this report compares efficiency in common use areas through experimental evidence, and also evaluates differences in design through study of relevant literature. The results are then discussed and weighed to provide a conclusion. The results of this work shows that Docker has the capability to potentially take over the role as the main virtualization technology in the coming years, providing some of its current shortcomings are addressed and improved upon.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Athreya, Manoj B. « Subverting Linux on-the-fly using hardware virtualization technology ». Thesis, Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/34844.

Texte intégral
Résumé :
In this thesis, we address the problem faced by modern operating systems due to the exploitation of Hardware-Assisted Full-Virtualization technology by attackers. Virtualization technology has been of growing importance these days. With the help of such a technology, multiple operating systems can be run on a single piece of hardware, with little or no modification to the operating system. Both Intel and AMD have contributed to x86 full-virtualization through their respective instruction set architectures. Hardware virtualization extensions can be found in almost all x86 processors these days. Hardware virtualization technologies have opened a whole new frontier for a new kind of attack. A system hacker can abuse hardware virualization technology to gain control over an operating system on-the-fly (i.e., without a system restart) by installing a thin Virtual Machine Monitor (VMM) below the native operating system. Such a VMM based malware is termed a Hardware-Assisted Virtual Machine (HVM) rootkit. We discuss the technique used by a rootkit named Blue Pill to subvert the Windows Vista operating system by exploiting the AMD-V (codenamed "Pacifica") virtualization extensions. HVM rootkits do not hook any operating system code or data regions; hence detecting the existence of such malware using conventional techniques becomes extremely difficult. This thesis discusses existing methods to detect such rootkits and their inefficiencies. In this work, we implement a proof-of-concept HVM rootkit using Intel-VT hardware virtualization technology and also discuss how such an attack can be defended against by using an autonomic architecture called SHARK, which was proposed by Vikas et al., in MICRO 2008.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Chen, Wei. « Light-Weight Virtualization Driven Runtimes for Big Data Applications ». Thesis, University of Colorado Colorado Springs, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13862451.

Texte intégral
Résumé :

Datacenters are evolving to host heterogeneous Big Data workloads on shared clusters to reduce the operational cost and achieve higher resource utilization. However, it is challenging to schedule heterogeneous workloads with diverse resource requirements and QoS constraints. For example, when consolidating latency critical jobs and best-effort batch jobs in the same cluster, latency critical jobs may suffer from long queuing delay if their resource requests cannot be met immediately; while best-effort jobs would suffer from killing overhead when preempted. Moreover, resource contention may harm task performance running on worker nodes. Since resource requirements for diverse applications show heterogeneity and is not known before task execution, either the cluster manager has to over-provision resources for all incoming applications resulting in low cluster utilization; or applications may experience performance slowdown or even failure due to resource insufficiency. Existing approaches focus on either application awareness or system awareness and fail to address the semantic gap between the application layer and the system layer (e.g., OS scheduling mechanisms or cloud resource allocators).

To address these issues, we propose to attack these problems from a different angle. In other words, applications and underlying systems should cooperate synergistically. This this way, the resource demands of application can be exposed to the system. At the same time, application schedulers can be assisted with more runtimes of the system layer and perform more dedicated scheduling. However, the system and application co-design is challenging. First, the real resource demands for an application is hard to be predicted since its requirements vary during its lifetime. Second, there are tons of information generated from system layers (e.g., OS process schedulers or hardware counters), from which it is hard to associate these information to a dedicated task. Fortunately, with the help of lightweight virtualization, applications could run in isolated containers such that system level runtime information can be collected at the container level. The rich APIs of container based virtualization also enable to perform more advanced scheduling.

In this thesis, we focus on efficient and scalable techniques in datacenter scheduling by leveraging lightweight virtualization. Our thesis is two folds. First, we focus on profiling and optimizing the performance of Big Data applications. In this aspect, we built a tool to trace the scheduling delay for low-latency online data analytics workloads. We further built a map execution engine to address the performance heterogeneity for MapReduce. Second, we focus on leveraging OS containers to build advanced cluster scheduling mechanisms. In that, we built a preemptive cluster scheduler, an elastic memory manager and an OOM killer for Big Data applications. We also conducted a supplementary research on tracing the performance of Big Data training on TensorFlow.

We conducted extensive evaluations of the proposed projects in a real-world cluster. The experimental results demonstrate the effectiveness of proposed approaches in terms of improving performance and utilization of Big Data clusters.

Styles APA, Harvard, Vancouver, ISO, etc.
10

WENG, LI. « Automatic and efficient data virtualization system for scientific datasets ». The Ohio State University, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=osu1154717945.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Livres sur le sujet "Computer virtualization"

1

Ruest, Danielle. Virtualization. New York : McGraw-Hill, 2009.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

1971-, Newman Amy, dir. Practical virtualization solutions : Virtualization from the trenches. Upper Saddle River, NJ : Prentice Hall/Pearson Education, 2010.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Hess, Kenneth. Practical virtualization solutions : Virtualization from the trenches. Upper Saddle River, NJ : Prentice Hall/Pearson Education, 2010.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Hess, Kenneth. Practical virtualization solutions : Virtualization from the trenches. Upper Saddle River, NJ : Prentice Hall, 2009.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Mastering Microsoft virtualization. Indianapolis, Ind : Wiley Pub., 2010.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Virtualization for dummies. Hoboken, N.J : Wiley, 2007.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Golden, Bernard. Virtualization for dummies. Hoboken, N.J : Wiley, 2007.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Hagen, William Von. Professional Xen Virtualization. New York : John Wiley & Sons, Ltd., 2008.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Babette, Haeusser, et International Business Machines Corporation. International Technical Support Organization., dir. IBM Virtualization engine TS7700 : Tape virtualization for System Z servers. 2e éd. [Poughkeepsie, N.Y.] : International Technical Support Organization, 2008.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Golden, Bernard. Virtualization for dummies. Hoboken, N.J : Wiley, 2008.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Chapitres de livres sur le sujet "Computer virtualization"

1

Kizza, Joseph Migga. « Virtualization Security ». Dans Guide to Computer Network Security, 473–90. London : Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_22.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Angepat, Hari, Derek Chiou, Eric S. Chung et James C. Hoe. « Simulation Virtualization ». Dans FPGA-Accelerated Simulation of Computer Systems, 31–44. Cham : Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-031-01744-5_4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Kizza, Joseph Migga. « Virtualization Technology and Security ». Dans Texts in Computer Science, 459–76. Cham : Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38141-7_21.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Kizza, Joseph Migga. « Virtualization Technology and Security ». Dans Guide to Computer Network Security, 457–75. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_21.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Kazim, Muhammad, et Shao Ying Zhu. « Virtualization Security in Cloud Computing ». Dans Computer Communications and Networks, 51–63. Cham : Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25988-8_4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Chen, Chen, Zhuyun Qi, Yirui Liu et Kai Lei. « Using Virtualization for Blockchain Testing ». Dans Lecture Notes in Computer Science, 289–99. Cham : Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-73830-7_29.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Wang, Xiaolin, Lingmei Weng, Zhenlin Wang et Yingwei Luo. « Towards Eliminating Memory Virtualization Overhead ». Dans Lecture Notes in Computer Science, 295–306. Berlin, Heidelberg : Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-45293-2_22.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Johanssen, Michael. « Update on System Virtualization Management ». Dans Communications in Computer and Information Science, 125–34. Berlin, Heidelberg : Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88708-9_13.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Loganayagi, B., et S. Sujatha. « Improving Cloud Security through Virtualization ». Dans Communications in Computer and Information Science, 442–52. Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24043-0_45.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Danciu, Vitalian A., et Martin G. Metzker. « On I/O Virtualization Management ». Dans Communications in Computer and Information Science, 75–86. Berlin, Heidelberg : Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14944-3_9.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "Computer virtualization"

1

Arslan, Ibrahim, et Izzet Gokhan Ozbilgin. « Virtualization and security : Examination of a virtualization platform structure ». Dans 2017 International Conference on Computer Science and Engineering (UBMK). IEEE, 2017. http://dx.doi.org/10.1109/ubmk.2017.8093379.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Alaluna, Max, Nuno Neves et Fernando M. V. Ramos. « Elastic Network Virtualization ». Dans IEEE INFOCOM 2020 - IEEE Conference on Computer Communications. IEEE, 2020. http://dx.doi.org/10.1109/infocom41043.2020.9155287.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

« Application of Virtualization Technology in Computer Experiments ». Dans 2017 International Conference on Materials, Energy, Civil Engineering and Computer. Francis Academic Press, 2017. http://dx.doi.org/10.25236/matecc.2017.21.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Tsao, Po-Jui, Yi-Feng Sun, Li-Han Chen et Chuan-Yu Cho. « Efficient Virtualization-Based Fault Tolerance ». Dans 2016 International Computer Symposium (ICS). IEEE, 2016. http://dx.doi.org/10.1109/ics.2016.0031.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

AbdElRahem, Omnia, Ayman M. Bahaa-Eldin et Ayman Taha. « Virtualization security : A survey ». Dans 2016 11th International Conference on Computer Engineering & Systems (ICCES). IEEE, 2016. http://dx.doi.org/10.1109/icces.2016.7821971.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Volpano, Dennis. « Modular network function virtualization ». Dans 2017 IEEE Conference on Computer Communications : Workshops (INFOCOM WKSHPS). IEEE, 2017. http://dx.doi.org/10.1109/infcomw.2017.8116499.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Zacharov, I., O. Panarin, E. Ryabinkin, K. Izotov et A. Teslyuk. « Virtualization for Scientific Workload ». Dans 2018 International Scientific and Technical Conference Modern Computer Network Technologies (MoNeTeC). IEEE, 2018. http://dx.doi.org/10.1109/monetec.2018.8572238.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Reeser, Jon, Thomas Jankowski et Greg M. Kemper. « Maintaining HMI and SCADA systems through computer virtualization ». Dans 2014 IEEE-IAS/PCA Cement Industry Technical Conference. IEEE, 2014. http://dx.doi.org/10.1109/citcon.2014.6820114.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Sayed, Suzan M., Shawky E. Shaaban et El-Sayed A. M. El-Badawy. « LTE Network Virtualization Feasibility Study ». Dans 2014 International Conference on Computer & Communication Engineering (ICCCE). IEEE, 2014. http://dx.doi.org/10.1109/iccce.2014.54.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Egi, Norbert, Adam Greenhalgh, Mark Handley, Mickael Hoerdt, Laurent Mathy et Tim Schooley. « Evaluating Xen for Router Virtualization ». Dans 2007 16th International Conference on Computer Communications and Networks. IEEE, 2007. http://dx.doi.org/10.1109/icccn.2007.4317993.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Rapports d'organisations sur le sujet "Computer virtualization"

1

Wheeler, Christopher. Virtualization Shares : Feasibility and Implementation in the USNA Computer Science Department. Fort Belvoir, VA : Defense Technical Information Center, mars 2010. http://dx.doi.org/10.21236/ada532377.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Semerikov, Serhiy, Viacheslav Osadchyi et Olena Kuzminska. Proceedings of the 1st Symposium on Advances in Educational Technology - Volume 2 : AET. SciTePress, 2022. http://dx.doi.org/10.31812/123456789/7011.

Texte intégral
Résumé :
Symposium on Advances in Educational Technology (AET) is a peer-reviewed international conference focusing on research advances and applications of combined use of computer hardware, software, and educational theory and practice to facilitate learning. Today, AET is the premier interdisciplinary forum for learning scientists, academicians, researchers, professionals, policymakers, postgraduate students, and practitioners to present their latest research results, ideas, developments, and applications. AET topics of interest are: • Artificial intelligence in education • Augmented reality in education • Cloud-based learning environments • Cloud technologies for mathematics learning • Cloud technologies for informatics learning • Computer simulation in science and mathematics learning • ICT in primary and secondary education • ICT in higher education • Learning environments • Learning technology • Professional training in the digital space • Massive open online courses • Methodology of informatization in education • Modelling systems in education • Psychological safety in the digital educational environment • Soft skills development • STEM education • Virtualization of learning This volume represents the proceedings of the Symposium on Advances in Educational Technology, held in Kyiv, Ukraine, on November 12-13, 2020. It comprises 110 contributed papers that were carefully peer-reviewed and selected from 282 submissions. Each submission was reviewed by at least 3, and on the average 3.1, program committee members. The accepted papers present a state-of-the-art overview of successful cases and provide guidelines for future research. We are thankful to all the authors who submitted papers and the delegates for their participation and their interest in AET as a platform to share their ideas and innovation. Also, we are also thankful to all the program committee members for providing continuous guidance and efforts taken by peer reviewers contributed to improve the quality of papers provided constructive critical comments, improvements and corrections to the authors are gratefully appreciated for their contribution to the success of the workshop. Moreover, we would like to thank the developers of HotCRP, who made it possible for us to use the resources of this excellent and comprehensive conference management system, from the call of papers and inviting reviewers, to handling paper submissions, communicating with the authors, and creating the volume of the workshop proceedings.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie