Sciweavers

1453 search results - page 193 / 291
» State and history in operating systems
Sort
View
107
Voted
CISS
2010
IEEE
14 years 4 months ago
Concentration of measure for block diagonal matrices with repeated blocks
Abstract—The theoretical analysis of randomized compressive operators often relies on the existence of a concentration of measure inequality for the operator of interest. Though ...
Christopher J. Rozell, Han Lun Yap, Jae Young Park...
131
Voted
VEE
2009
ACM
130views Virtualization» more  VEE 2009»
15 years 5 months ago
Post-copy based live virtual machine migration using adaptive pre-paging and dynamic self-ballooning
We present the design, implementation, and evaluation of post-copy based live migration for virtual machines (VMs) across a Gigabit LAN. Live migration is an indispensable feature...
Michael R. Hines, Kartik Gopalan
96
Voted
CCS
2006
ACM
15 years 4 months ago
Beyond separation of duty: an algebra for specifying high-level security policies
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
Ninghui Li, Qihua Wang
98
Voted
VEE
2012
ACM
214views Virtualization» more  VEE 2012»
13 years 8 months ago
CompSC: live migration with pass-through devices
Live migration is one of the most important features of virtualization technology. With regard to recent virtualization techniques, performance of network I/O is critical. Current...
Zhenhao Pan, Yaozu Dong, Yu Chen, Lei Zhang, Zhiji...
99
Voted
EDBT
2009
ACM
158views Database» more  EDBT 2009»
15 years 3 months ago
An approach to detecting relevant updates to cached data using XML and active databases
Client/server information systems use caching techniques to reduce the volume of transmitted data as well as response time and, especially in the case of systems with mobile clien...
Essam Mansour, Hagen Höpfner