Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Application virtualization

Known as: Application Virtualisation, Process virtualization, Virtual Application Studio 2008 
Application virtualization is software technology that encapsulates computer programs from the underlying operating system on which it is executed. A… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2013
2013
Light detection and ranging (lidar) technologies have proven to be the most powerful tools to collect, within a short time, three… Expand
  • table 1
  • table 3
Is this relevant?
2013
2013
In a consolidated virtualized environment, multiple virtual machines (VMs) are hosted atop a shared physical substrate. They… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2012
2012
Increasingly, processes that have relied on physical interaction between people, and between people and objects are being… Expand
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Green IT (information technology) has recently emerged into an active research area in the information systems (IS) discipline. A… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • figure 2
Is this relevant?
2011
2011
Laboratory-based mobile wireless testbeds such as MeshTest and the CMU Wireless Emulator are powerful platforms that allow users… Expand
  • figure 2
  • figure 1
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Model-based definition (MBD) is a new strategy of product lifecycle management (PLM) based on computer-aided design (CAD) models… Expand
  • figure 1
  • figure 2
  • table 2
  • table 4
  • table 5
Is this relevant?
2009
2009
Message-Passing Interface (MPI) has become a standard for parallel applications in high-performance computing. Within a single… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2007
2007
The vulnerability of a modem computer network to information attacks stems from its high complexity, global interconnectivity and… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
As the world becomes an increasingly virtual place, a growing number of processes are being conducted online or through other… Expand
Is this relevant?