Sciweavers

1234 search results - page 37 / 247
» Privacy-preserving Virtual Machine
Sort
View
GCC
2009
Springer
15 years 1 months ago
Interfaces for Placement, Migration, and Monitoring of Virtual Machines in Federated Clouds
Current cloud computing infrastructure offerings are lacking in interoperability, which is a hindrance to the advancement and adoption of the cloud computing paradigm. As clouds ar...
Erik Elmroth, Lars Larsson
169
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
Consolidating virtual machines with dynamic bandwidth demand in data centers
—Recent advances in virtualization technology have made it a common practice to consolidate virtual machines(VMs) into a fewer number of servers. An efficient consolidation sche...
Meng Wang, Xiaoqiao Meng, Li Zhang 0002
128
Voted
ICCS
2003
Springer
15 years 8 months ago
A Parallel Virtual Machine for Bulk Synchronous Parallel ML
We have designed a functional data-parallel language called BSML for programming bulk-synchronous parallel (BSP) algorithms. The execution time can be estimated and dead-locks and ...
Frédéric Gava, Frédéri...
CTRSA
2010
Springer
200views Cryptology» more  CTRSA 2010»
15 years 10 months ago
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
Typical security models used for proving security of deployed cryptographic primitives do not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is c...
Scott Yilek
114
Voted
ICNSC
2008
IEEE
15 years 10 months ago
A Self-Configuring Communication Virtual Machine
Today's communication-based applications are mostly crafted in a stovepipe development paradigm, which is inflexible to be used by various domain-specific applications and cos...
Seyed Masoud Sadjadi, Selim Kalayci, Yi Deng