Sciweavers

185 search results - page 11 / 37
» Analysis of virtual machine system policies
Sort
View
108
Voted
HICSS
2007
IEEE
171views Biometrics» more  HICSS 2007»
15 years 4 months ago
Unified Architecture for Large-Scale Attested Metering
We introduce a secure architecture called an attested meter for advanced metering that supports large-scale deployments, flexible configurations, and enhanced protection for consu...
Michael LeMay, George Gross, Carl A. Gunter, Sanja...
CRITIS
2007
15 years 1 months ago
Managing Critical Infrastructures through Virtual Network Communities
Abstract. Virtual Interacting Network CommunIty (Vinci) is an abstract architecture to share in a secure way an ICT infrastructure among several user communities, each with its own...
Fabrizio Baiardi, Gaspare Sala, Daniele Sgandurra
116
Voted
USENIX
2004
15 years 1 months ago
Xen and the Art of Repeated Research
Xen is an x86 virtual machine monitor produced by the University of Cambridge Computer Laboratory and released under the GNU General Public License. Performance results comparing ...
Bryan Clark, Todd Deshane, Eli Dow, Stephen Evanch...
HPDC
2000
IEEE
15 years 4 months ago
Evaluation of Task Assignment Policies for Supercomputing Servers: The Case for Load Unbalancing and Fairness
While the MPP is still the most common architecture in supercomputer centers today, a simpler and cheaper machine configuration is growing increasingly common. This alternative s...
Bianca Schroeder, Mor Harchol-Balter
SIGCOMM
2009
ACM
15 years 6 months ago
Virtual individual servers as privacy-preserving proxies for mobile devices
People increasingly generate content on their mobile devices and upload it to third-party services such as Facebook and Google Latitude for sharing and backup purposes. Although t...
Ramón Cáceres, Landon P. Cox, Harold...