Journal articles on the topic 'Hypervisor'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Hypervisor.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Shetty, Jyoti, Sahana Upadhaya, Rajarajeshwari H S, Shobha G, and Jayant Chandra. "An Empirical Performance Evaluation of Docker Container, Openstack Virtual Machine and Bare Metal Server." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 1 (July 1, 2017): 205. http://dx.doi.org/10.11591/ijeecs.v7.i1.pp205-213.
Full textBarrowclough, John Patrick, and Rameez Asif. "Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures." Security and Communication Networks 2018 (June 11, 2018): 1–20. http://dx.doi.org/10.1155/2018/1681908.
Full textBoberić, Milan. "JEDNO OD REŠENJA ZA PARTICIONISANJE CENTRALNE PROCESORSKE JEDINICE SA VIŠE JEZGARA." Zbornik radova Fakulteta tehničkih nauka u Novom Sadu 34, no. 04 (March 22, 2019): 781–84. http://dx.doi.org/10.24867/02ih07boberic.
Full textKashyap, Rekha, and Deo Prakash Vidyarthi. "A Secured Real Time Scheduling Model for Cloud Hypervisor." International Journal of Cloud Applications and Computing 6, no. 4 (October 2016): 97–110. http://dx.doi.org/10.4018/ijcac.2016100106.
Full textFox, Dirk. "Hypervisor." Datenschutz und Datensicherheit - DuD 36, no. 1 (January 2012): 54. http://dx.doi.org/10.1007/s11623-012-0012-y.
Full textSilva, Daniel, Joao Rafael, and Alexandre Fonte. "Virtualization Maturity in Creating System VM: An Updated Performance Evaluation." International Journal of Electrical and Computer Engineering Research 3, no. 2 (June 15, 2023): 7–17. http://dx.doi.org/10.53375/ijecer.2023.341.
Full textPatange, Pritam. "Virtual Disks Performance Analysis Using Flexible I/O and Powerstat." International Journal for Research in Applied Science and Engineering Technology 9, no. 10 (October 31, 2021): 267–96. http://dx.doi.org/10.22214/ijraset.2021.38392.
Full textDoğan, Atakan, and Kemal Ebcioğlu. "Cloud Building Block Chip for Creating FPGA and ASIC Clouds." ACM Transactions on Reconfigurable Technology and Systems 15, no. 2 (June 30, 2022): 1–35. http://dx.doi.org/10.1145/3466822.
Full textCaturiyanto, Totok Wahyu, Arief Setyanto, and Eko Pramono. "Analisa Dan Perbandingan Performa Hypervisor ESXi, XEN, VMWARE Workstation Pro, Dan Virtualbox." Jurnal Informa : Jurnal Penelitian dan Pengabdian Masyarakat 6, no. 2 (December 15, 2020): 40–44. http://dx.doi.org/10.46808/informa.v6i2.182.
Full textPerneel, L., H. Fayyad-Kazan, L. Peng, F. Guan, and M. Timmerman. "Business Hypervisors for Real-time Applications." Engineering, Technology & Applied Science Research 5, no. 4 (August 17, 2015): 832–40. http://dx.doi.org/10.48084/etasr.568.
Full textLiu, Zongyuan, Sergei Stepanenko, Jean Pichon-Pharabod, Amin Timany, Aslan Askarov, and Lars Birkedal. "VMSL: A Separation Logic for Mechanised Robust Safety of Virtual Machines Communicating above FF-A." Proceedings of the ACM on Programming Languages 7, PLDI (June 6, 2023): 1438–62. http://dx.doi.org/10.1145/3591279.
Full textYang, Xia. "An Effective Approach to Migrate Application to Secure Cloud." Advanced Materials Research 1078 (December 2014): 409–12. http://dx.doi.org/10.4028/www.scientific.net/amr.1078.409.
Full textAbdulraheem, Waleed. "Performance Comparison of Xen AND Hyper-V in Cloud Computing While Using Cryptosystems." International Journal of Advances in Soft Computing and its Applications 14, no. 3 (November 28, 2022): 18–30. http://dx.doi.org/10.15849/ijasca.221128.02.
Full textZoughbi, Dina Mohsen, and Nitul Dutta. "Hypervisor Vulnerabilities and Some Defense Mechanisms, in Cloud Computing Environment." International Journal of Innovative Technology and Exploring Engineering 10, no. 2 (December 10, 2020): 42–48. http://dx.doi.org/10.35940/ijitee.b8262.1210220.
Full textR.Kennady, Et al. "An Embedded Approach to Hypervisor-Oriented Interruption Virtualization Operation." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4 (April 30, 2023): 388–91. http://dx.doi.org/10.17762/ijritcc.v11i4.9846.
Full textJiménez, Jaime, Leire Muguira, Unai Bidarte, Alejandro Largacha, and Jesús Lázaro. "Specific Electronic Platform to Test the Influence of Hypervisors on the Performance of Embedded Systems." Technologies 10, no. 3 (May 24, 2022): 65. http://dx.doi.org/10.3390/technologies10030065.
Full textKaracali, Hüseyin, Nevzat Dönüm, and Efecan Cebel. "Xen Hypervisor Network Management System." European Journal of Research and Development 3, no. 1 (March 28, 2023): 71–85. http://dx.doi.org/10.56038/ejrnd.v3i1.244.
Full textSeo, Junho, Seonah Lee, Ki-Il Kim, and Kyong Hoon Kim. "A Fine-Grained Secure Service Provisioning Platform for Hypervisor Systems." Electronics 11, no. 10 (May 18, 2022): 1606. http://dx.doi.org/10.3390/electronics11101606.
Full textBressoud, Thomas C., and Fred B. Schneider. "Hypervisor-based fault tolerance." ACM Transactions on Computer Systems 14, no. 1 (February 1996): 80–107. http://dx.doi.org/10.1145/225535.225538.
Full textBressoud, T. C., and F. B. Schneider. "Hypervisor-based fault tolerance." ACM SIGOPS Operating Systems Review 29, no. 5 (December 3, 1995): 1–11. http://dx.doi.org/10.1145/224057.224058.
Full textKo, Wonseok, Jeongwoo Yoo, Ingu Kang, Jinwoo Jun, Inki Hwang, and Sung-Soo Lim. "K-Hypervisor: Design and Implementation of ARM Hypervisor for Real-Time Embedded Systems." KIISE Transactions on Computing Practices 23, no. 4 (April 15, 2017): 199–209. http://dx.doi.org/10.5626/ktcp.2017.23.4.199.
Full textNo, Jaechun, and Sung-soon Park. "MultiCache: Multilayered Cache Implementation for I/O Virtualization." Scientific Programming 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/3780163.
Full textĐorđević, Borislav, Valentina Timčenko, Nemanja Maček, and Mitko Bogdanoski. "Performance modeling of file system pairs in hypervisor-based virtual environment applied on KVM hypervisor case study." Journal of Computer and Forensic Sciences 1, no. 1 (2022): 55–75. http://dx.doi.org/10.5937/1-42712.
Full textWijayanto, Danur, Arizona Firdonsyah, Faisal Dharma Adhinata, and Akhmad Jayadi. "Rancang Bangung Private Server Menggunakan Platform Proxmox dengan Studi Kasus: PT.MKNT." Journal ICTEE 2, no. 2 (November 23, 2021): 41. http://dx.doi.org/10.33365/jictee.v2i2.1333.
Full textYehuda, Raz Ben, Erez Shlingbaum, Yuval Gershfeld, Shaked Tayouri, and Nezer Jacob Zaidenberg. "Hypervisor memory acquisition for ARM." Forensic Science International: Digital Investigation 37 (June 2021): 301106. http://dx.doi.org/10.1016/j.fsidi.2020.301106.
Full textPratap, Lokendra, and Mukesh Kumar. "A Forensics Approach for Hypervisor." International Journal of Computer Applications 182, no. 33 (December 17, 2018): 11–16. http://dx.doi.org/10.5120/ijca2018918267.
Full textG, Senthil Kumar. "Framework for Hypervisor in Grid." International Journal of Electrical and Electronics Engineering 1, no. 1 (January 25, 2014): 9–15. http://dx.doi.org/10.14445/23488379/ijeee-v1i1p103.
Full textKiperberg, Michael, Roee Leon, Amit Resh, Asaf Algawi, and Nezer J. Zaidenberg. "Hypervisor-Based Protection of Code." IEEE Transactions on Information Forensics and Security 14, no. 8 (August 2019): 2203–16. http://dx.doi.org/10.1109/tifs.2019.2894577.
Full textAlmutairi, Badr. "Secure mitigation and migration of virtual machines over hybrid cloud hypervisors infrastructure." International Journal of ADVANCED AND APPLIED SCIENCES 8, no. 7 (July 2021): 7–13. http://dx.doi.org/10.21833/ijaas.2021.07.002.
Full textFathoni, Muhammad Faris, Seonah Lee, Yoonsoo Kim, Ki-Il Kim, and Kyong Hoon Kim. "Development of Multi-Quadrotor Simulator Based on Real-Time Hypervisor Systems." Drones 5, no. 3 (July 8, 2021): 59. http://dx.doi.org/10.3390/drones5030059.
Full textColafranceschi, Stefano, and Emanuele De Biase. "The Case for a Cost-Effective General-Purpose Computer Cluster for Small Colleges." International Journal of Emerging Technologies in Learning (iJET) 16, no. 04 (February 26, 2021): 4. http://dx.doi.org/10.3991/ijet.v16i04.18837.
Full textZmeev, A. "EVALUATING THE RELATIONSHIP BETWEEN THE SIGNIFICANCE OF COMMANDS FOR IMPLEMENTING UNAUTHORIZED ACCESS TO THE HYPERVISOR THROUGH A VM BASED ON FUZZY LOGIC METHODS." Modeling of systems and processes 13, no. 2 (September 21, 2020): 33–39. http://dx.doi.org/10.12737/2219-0767-2020-13-2-33-39.
Full textDwiyatno, Saleh, Edy Rachmat, Ayu Purnama Sari, and Oki Gustiawan. "IMPLEMENTASI VIRTUALISASI SERVER BERBASIS DOCKER CONTAINER." PROSISKO: Jurnal Pengembangan Riset dan Observasi Sistem Komputer 7, no. 2 (September 1, 2020): 165–75. http://dx.doi.org/10.30656/prosisko.v7i2.2520.
Full textShang, Ming. "A New Hardware Isolation Architecture." Applied Mechanics and Materials 530-531 (February 2014): 631–36. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.631.
Full textKiperberg, Michael, and Nezer Jacob Zaidenberg. "H-KPP: Hypervisor-Assisted Kernel Patch Protection." Applied Sciences 12, no. 10 (May 18, 2022): 5076. http://dx.doi.org/10.3390/app12105076.
Full textAhuja, Sanjay P., and Suganya Sridharan. "Performance Evaluation of Hypervisors for Cloud Computing." International Journal of Cloud Applications and Computing 2, no. 3 (July 2012): 26–67. http://dx.doi.org/10.4018/ijcac.2012070102.
Full textRong Chang, Bao, Hsiu-Fen Tsai, Chi-Ming Chen, and Chien-Feng Huang. "Analysis of virtualized cloud server together with shared storage and estimation of consolidation ratio and TCO/ROI." Engineering Computations 31, no. 8 (October 28, 2014): 1746–60. http://dx.doi.org/10.1108/ec-11-2012-0295.
Full textSzefer, Jakub, and Ruby B. Lee. "Architectural support for hypervisor-secure virtualization." ACM SIGARCH Computer Architecture News 40, no. 1 (April 18, 2012): 437–50. http://dx.doi.org/10.1145/2189750.2151022.
Full textBauman, Erick, Gbadebo Ayoade, and Zhiqiang Lin. "A Survey on Hypervisor-Based Monitoring." ACM Computing Surveys 48, no. 1 (September 29, 2015): 1–33. http://dx.doi.org/10.1145/2775111.
Full textZávacký, Pavol, Andrej Eliáš, and Maximilián Stémy. "Hypervisor for Virtualization in Private Cloud." Research Papers Faculty of Materials Science and Technology Slovak University of Technology 23, s1 (August 1, 2015): 79–84. http://dx.doi.org/10.1515/rput-2015-0030.
Full textSuzuki, Yusuke, Shinpei Kato, Hiroshi Yamada, and Kenji Kono. "GPUvm: GPU Virtualization at the Hypervisor." IEEE Transactions on Computers 65, no. 9 (September 1, 2016): 2752–66. http://dx.doi.org/10.1109/tc.2015.2506582.
Full textAmbika, M., and Kolasani Ramchand H. Rao. "A Novel Framework for Hypervisor Design." Procedia Computer Science 79 (2016): 190–98. http://dx.doi.org/10.1016/j.procs.2016.03.025.
Full textFattori, Aristide, Andrea Lanzi, Davide Balzarotti, and Engin Kirda. "Hypervisor-based malware protection with AccessMiner." Computers & Security 52 (July 2015): 33–50. http://dx.doi.org/10.1016/j.cose.2015.03.007.
Full textCrespo, A., M. Masmano, J. Coronel, S. Peiró, P. Balbastre, and J. Simó. "Multicore partitioned systems based on hypervisor." IFAC Proceedings Volumes 47, no. 3 (2014): 12293–98. http://dx.doi.org/10.3182/20140824-6-za-1003.02410.
Full textLeon, Roee S., Michael Kiperberg, Anat Anatey Leon Zabag, Amit Resh, Asaf Algawi, and Nezer J. Zaidenberg. "Hypervisor-Based White Listing of Executables." IEEE Security & Privacy 17, no. 5 (September 2019): 58–67. http://dx.doi.org/10.1109/msec.2019.2910218.
Full textSzefer, Jakub, and Ruby B. Lee. "Architectural support for hypervisor-secure virtualization." ACM SIGPLAN Notices 47, no. 4 (June 2012): 437–50. http://dx.doi.org/10.1145/2248487.2151022.
Full textSpink, Tom, Harry Wagstaff, and Björn Franke. "A Retargetable System-level DBT Hypervisor." ACM Transactions on Computer Systems 36, no. 4 (June 11, 2020): 1–24. http://dx.doi.org/10.1145/3386161.
Full textGamess, Eric, Mausam Parajuli, and Syed Shah. "Performance Evaluation of the KVM Hypervisor Running on ARM-Based Single-Board Computers." International journal of Computer Networks & Communications 15, no. 2 (March 30, 2023): 147–64. http://dx.doi.org/10.5121/ijcnc.2023.15208.
Full textAlnaim, Abdulrahman K. "Misuse Patterns from the Threat of Modification of Non-Control Data in Network Function Virtualization." Future Internet 14, no. 7 (June 30, 2022): 201. http://dx.doi.org/10.3390/fi14070201.
Full textAlonso, Sara, Jesús Lázaro, Jaime Jiménez, Unai Bidarte, and Leire Muguira. "Evaluating Latency in Multiprocessing Embedded Systems for the Smart Grid." Energies 14, no. 11 (June 5, 2021): 3322. http://dx.doi.org/10.3390/en14113322.
Full text