The security issue that resides in VM live migration is a critical factor for its acceptance by IT industry. We propose to leverage Intel vPro and TPM to improve security in virtual machine live migration. A role-based mechanism is introduced, under which the VM migration is controlled by specific policies that are protected in seal storage. In the… (More)
A fundamental goal for Cloud computing is to group resources to accomplish tasks that may require strong computing or communication capability. In this paper we design specific resource sharing technology under which IO peripherals can be shared among Cloud members. In particular, in a personal Cloud that is built up by a number of personal devices, IO… (More)
USENIX is a registered trademark of the USENIX Association. USENIX acknowledges all trademarks herein.
This paper examines techniques for normalization of unseen speakers in recognition. Two implementations of linear spectrum warping were examined: time domain resampling and filter bank scaling. It is shown that for seen speakers, the models trained by unwarped utterances are less sensitive to spectrum warping by filter bank scaling than by resampling. A… (More)
does and seeks to do business with companies covered in Morgan Stanley Research. As a result, investors should be aware that the firm may have a conflict of interest that could affect the objectivity of Morgan Stanley Research. Investors should consider Morgan Stanley Research as only a single factor in making their investment decision. For analyst… (More)
St ra te gi es , To ol s, an d Te ch ni qu es J o in u s fo r 6 d a y s o f p ra c ti c a l tr a in in g o n to p ic s in c lu d in g : • V ir tu a li za ti o n w it h V M w a re J o h n A rr a sj id , B e n D e l BLOCKINV e n to , D a vi d H ill , B e n L in , a n d M a h e sh R a ja n i, V M w a re • U s in g a n d M ig ra ti n g to IP v 6 S h u m o n H u… (More)