Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Virtualisation processus")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 264

  • Page / 11
Export

Selection :

  • and

Duality of Virtualization: Simplification and Complexity : System Work at IBM ResearchFONG, Liana; STEINDER, Malgorzata.Operating systems review. 2008, Vol 42, Num 1, pp 96-97, issn 0163-5980, 2 p.Article

I/O VirtualizationWALDSPURGER, Carl; ROSENBLUM, Mendel.Communications of the ACM. 2012, Vol 55, Num 1, pp 66-72, issn 0001-0782, 7 p.Article

Virtualize MeSPINELLIS, Diomidis.IEEE software. 2012, Vol 29, Num 5, pp 91-93, issn 0740-7459, 3 p.Article

Specialized Execution Environments : System Work at IBM ResearchBUTRICO, Maria; DA SILVA, Dilma; KRIEGER, Orran et al.Operating systems review. 2008, Vol 42, Num 1, pp 106-107, issn 0163-5980, 2 p.Article

Offline Management in Virtualized EnvironmentsTHORAT, Nishant; RAGHAVENDRAN, Arvind; GROVES, Nigel et al.Communications of the ACM. 2013, Vol 56, Num 4, pp 75-81, issn 0001-0782, 7 p.Article

Effect of buffer cache on storage performance in virtualised environmentPARK, Hyunchan; YOO, Chuck.Electronics letters. 2013, Vol 49, Num 4, pp 251-253, issn 0013-5194, 3 p.Article

Reducing Obsolescence of Linux-Based ATEs with VirtualizationWELTZIN, Casey; SCHLONSKY, Sarah.IEEE instrumentation & measurement magazine. 2011, Vol 14, Num 4, pp 8-10, issn 1094-6969, 3 p.Article

The Paradox of Security in Virtual EnvironmentsPRICE, Michael.Computer (Long Beach, CA). 2008, Vol 41, Num 11, pp 22-28, issn 0018-9162, 7 p.Article

NETWORK VIRTUALISATION: CONCEPTS AND PERFORMANCE ASPECTSTUTSCHKU, Kurt; MÜLLER, Paul; DANG TRAN, Frédéric et al.International journal of communication networks and distributed systems (Print). 2011, Vol 6, Num 3, issn 1754-3916, 114 p.Serial Issue

Through an Event Log, DarklyDOUGLAS, Keith.The Information society. 2010, Vol 26, Num 1, pp 65-69, issn 0197-2243, 5 p.Article

Integrated Management of Network Virtualization: A Report on APNOMS 2013KINOSHITA, Kazuhiko; TAKANO, Makoto; LEE, Young-Woo et al.Journal of network and systems management. 2014, Vol 22, Num 3, pp 509-516, issn 1064-7570, 8 p.Article

Enabling a Marketplace of Clouds: VMware's vCloud DirectorKRIEAER, Orran; MCGACHEY, Phil; KANEVSKY, Arkady et al.Operating systems review. 2010, Vol 44, Num 4, pp 103-114, issn 0163-5980, 12 p.Article

Accelerating Two-Dimensional Page Walks for Virtualized SystemsBHARGAVA, Ravi; SEREBRIN, Benjamin; SPADINI, Francesco et al.Operating systems review. 2008, Vol 42, Num 2, pp 26-35, issn 0163-5980, 10 p.Conference Paper

AN ARCHITECTURE FOR SOFTWARE DEFINED WIRELESS NETWORKINGBERNARDOS, Carlos J; DE LA OLIVA, Antonio; SERRANO, Pablo et al.IEEE wireless communications. 2014, Vol 21, Num 3, pp 52-61, issn 1536-1284, 10 p.Article

Blueprinting the CloudPAPAZOGLOU, Michael P; VAN DEN HEUVEL, Willem-Jan.IEEE internet computing. 2011, Vol 15, Num 6, pp 74-79, issn 1089-7801, 6 p.Article

The Impact of Full Disk Encryption on Digital ForensicsCASEY, Eoghan.Operating systems review. 2008, Vol 42, Num 3, pp 93-98, issn 0163-5980, 6 p.Article

Virtualization Performance: Perspectives and Challenges AheadMCDOUGALL, Richard; ANDERSON, Jennifer.Operating systems review. 2010, Vol 44, Num 4, pp 40-56, issn 0163-5980, 17 p.Article

Employing Virtualization in Library Computing: Use Cases and Lessons LearnedHUTT, Arwen; STUART, Michael; SUCHY, Daniel et al.Information technology and libraries. 2009, Vol 28, Num 3, pp 110-115, issn 0730-9295, 6 p.Article

Context-Based Applications in Converged Networks: Beyond SIMPLE PresenceACHARYA, Arup; BANERJEE, Nilankan; CHAKARBORTY, Dipanjan et al.IEEE pervasive computing. 2013, Vol 12, Num 2, pp 59-67, issn 1536-1268, 9 p.Article

Detecting (and creating !) a HVM rootkit (aka BluePill-like)DESNOS, Anthony; FILIOL, Eric; LEFOU, Ivan et al.Journal in computer virology. 2011, Vol 7, Num 1, pp 23-49, issn 1772-9890, 27 p.Article

VIRTUALIZACIÓN, UNA SOLUCIÓN PARA LA EFICIENCIA, SEGURIDAD Y ADMINISTRACIÓN DE INTRANETS = Virtualization: a solution for efficiency, security and management of intranetsMARTIN, Diego; MARRERO, Mónica; URBANO, Julián et al.El Profesional de la información. 2011, Vol 20, Num 3, pp 348-354, issn 1386-6710, 7 p.Article

K-GENI testbed deployment and federated meta operations experiment over GENI and KREONETDONGKYUN KIM; JOOBUM KIM; GICHEOL WANG et al.Computer networks (1999). 2014, Vol 61, pp 39-50, issn 1389-1286, 12 p.Article

Optimisation schemes to improve hybrid co-scheduling for concurrent virtual machinesYULONG YU; YUXIN WANG; HE GUO et al.International journal of parallel, emergent and distributed systems (Print). 2013, Vol 28, Num 1, pp 46-66, issn 1744-5760, 21 p.Article

Stealth malware analysis from kernel space with KolumboDESFOSSEZ, Julien; DIEPPEDALE, Justine; GIRARD, Gabriel et al.Journal in computer virology. 2011, Vol 7, Num 1, pp 83-93, issn 1772-9890, 11 p.Article

Fast and Correct Performance Recovery of Operating Systems Using a Virtual Machine MonitorKOURAI, Kenichi.ACM SIGPLAN notices. 2011, Vol 46, Num 7, pp 99-109, issn 1523-2867, 11 p.Conference Paper

  • Page / 11