Journal articles on the topic 'OS-level virtualization'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 18 journal articles for your research on the topic 'OS-level virtualization.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Shan, Zhiyong, Xin Wang, Tzi-cker Chiueh, and Xiaofeng Meng. "Facilitating inter-application interactions for OS-level virtualization." ACM SIGPLAN Notices 47, no. 7 (2012): 75–86. http://dx.doi.org/10.1145/2365864.2151036.
Full textZhiyong Shan, Xin Wang, and Tzi-cker Chiueh. "Shuttle: Facilitating Inter-Application Interactions for OS-Level Virtualization." IEEE Transactions on Computers 63, no. 5 (2014): 1220–33. http://dx.doi.org/10.1109/tc.2012.297.
Full textRenner, Thomas, Marius Meldau, and Andreas Kliem. "Edge Resource Utilization Using OS-Level Virtualization on Smart Devices." Software Networking 2016, no. 1 (2016): 75–96. http://dx.doi.org/10.13052/jsn2445-9739.2016.005.
Full textMasood, Anum, Muhammad Sharif, Mussarat Yasmin, and Mudassar Raza. "Virtualization Tools and Techniques: Survey." Nepal Journal of Science and Technology 15, no. 2 (2015): 141–50. http://dx.doi.org/10.3126/njst.v15i2.12131.
Full textLee, Sang-Hun, Jong-Seo Kim, Jong-Soo Seok, and Hyun-Wook Jin. "Virtualization of Industrial Real-Time Networks for Containerized Controllers." Sensors 19, no. 20 (2019): 4405. http://dx.doi.org/10.3390/s19204405.
Full textZhang, Shuhui, Xiangxu Meng, Lianhai Wang, Lijuan Xu, and Xiaohui Han. "Secure Virtualization Environment Based on Advanced Memory Introspection." Security and Communication Networks 2018 (2018): 1–16. http://dx.doi.org/10.1155/2018/9410278.
Full textChoi, Jin-young, Minkyoung Cho, and Jik-Soo Kim. "Employing Vertical Elasticity for Efficient Big Data Processing in Container-Based Cloud Environments." Applied Sciences 11, no. 13 (2021): 6200. http://dx.doi.org/10.3390/app11136200.
Full textV, Dr Kiran, Akshay Narayan Pai, and Gautham S. "Performance Analysis of Virtual Machine in Cloud Architecture." Journal of University of Shanghai for Science and Technology 23, no. 07 (2021): 924–29. http://dx.doi.org/10.51201/jusst/21/07210.
Full textTorres, Gildo, and Chen Liu. "Adaptive Virtual Machine Management in the Cloud." International Journal of Systems and Service-Oriented Engineering 4, no. 2 (2014): 28–43. http://dx.doi.org/10.4018/ijssoe.2014040103.
Full textBai, Jin Rong, Guo Zhong Zou, and Shi Guang Mu. "Malware Analysis Platform Based on Secondary Development of Xen." Applied Mechanics and Materials 530-531 (February 2014): 865–68. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.865.
Full textZhang, Yiming, Chengfei Zhang, Yaozheng Wang, Kai Yu, Guangtao Xue, and Jon Crowcroft. "KylinX." ACM Transactions on Computer Systems 37, no. 1-4 (2021): 1–27. http://dx.doi.org/10.1145/3436512.
Full textOkunev, Boris V., Alexey I. Lazarev, and Pavel S. Kharlamov. "Virtualization of information object vulnerability testing container based on DeX technology and deep learning neural networks." Journal Of Applied Informatics 16, no. 4 (2021): 96–109. http://dx.doi.org/10.37791/2687-0649-2021-16-4-96-109.
Full textVhatkar, Kapil Netaji, and Girish P. Bhole. "Improved rider optimization for optimal container resource allocation in cloud with security assurance." International Journal of Pervasive Computing and Communications 16, no. 3 (2020): 235–58. http://dx.doi.org/10.1108/ijpcc-12-2019-0094.
Full textLIU, Bo-wen, Nai-jie GU, and De-he GU. "A Lightweight OS-Level Virtualization Architecture Based on Android." DEStech Transactions on Computer Science and Engineering, cnsce (May 5, 2017). http://dx.doi.org/10.12783/dtcse/cnsce2017/8866.
Full textTellabi, Asmaa, Christoph Ruland, Karl Waedt, and Abdelbast Sabri. "Self Diagnostics and Isolation Mechanisms for Mixed Criticality Systems." Journal of Communications Software and Systems 15, no. 4 (2019). http://dx.doi.org/10.24138/jcomss.v15i4.810.
Full text"Research Scope and Tools for Workflow Scheduling in Cloud Environment." International Journal of Engineering and Advanced Technology 8, no. 6S3 (2019): 1967–68. http://dx.doi.org/10.35940/ijeat.f1380.0986s319.
Full text"Log Analyzer for Update Manager." International Journal of Engineering and Advanced Technology 9, no. 5 (2020): 328–30. http://dx.doi.org/10.35940/ijeat.e9360.069520.
Full text"Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Technology." 2013 1, no. 2013 (2020): 61–67. http://dx.doi.org/10.47277/ijcncs/1(2)4.
Full text