Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,218,470 papers from all fields of science
Search
Sign In
Create Free Account
Reboot (computing)
Known as:
Warm reboot
, Cold reboot
, Reboot (computer)
Expand
In computing, rebooting is the process by which a running computer system is restarted, either intentionally or unintentionally. Reboots can be…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
48 relations
Advanced Configuration and Power Interface
Application checkpointing
BIOS
BIOS interrupt call
Expand
Broader (1)
Booting
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2019
Highly Cited
2019
Microservice Based Architecture: Towards High-Availability for Stateful Applications with Kubernetes
Leila Abdollahi Vayghan
,
M. Saied
,
M. Toeroe
,
F. Khendek
International Conference on Software Quality…
2019
Corpus ID: 203655376
Kubernetes is an open source platform that hides the complexity of orchestrating containerized microservices while managing their…
Expand
Highly Cited
2014
Highly Cited
2014
Warm absorbers in X-rays (WAX), a comprehensive high-resolution grating spectral study of a sample of Seyfert galaxies – I. A global view and frequency of occurrence of warm absorbers.
S. Laha
,
M. Guainazzi
,
G. Dewangan
,
S. Chakravorty
,
A. Kembhavi
2014
Corpus ID: 53553303
We present results from a homogeneous analysis of the broadband 0.3-10 keV CCD resolution as well as of soft X-ray high…
Expand
Highly Cited
2014
Highly Cited
2014
Copker: Computing with Private Keys without RAM
Le Guan
,
Jingqiang Lin
,
Bo Luo
,
Jiwu Jing
Network and Distributed System Security Symposium
2014
Corpus ID: 18608132
Cryptographic systems are essential for computer and communication security, for instance, RSA is used in PGP Email clients and…
Expand
Highly Cited
2009
Highly Cited
2009
Nonvolatile memristor memory: Device characteristics and design implications
Y. Ho
,
Garng M. Huang
,
Peng Li
IEEE/ACM International Conference on Computer…
2009
Corpus ID: 15606417
The search for new nonvolatile universal memories is propelled by the need for pushing power-efficient nanocomputing to the next…
Expand
Highly Cited
2007
Highly Cited
2007
A Fast Rejuvenation Technique for Server Consolidation with Virtual Machines
Kenichi Kourai
,
S. Chiba
Dependable Systems and Networks
2007
Corpus ID: 10727539
As server consolidation using virtual machines (VMs) is carried out, software aging of virtual machine monitors (VMMs) is…
Expand
Highly Cited
2006
Highly Cited
2006
SubVirt: implementing malware with virtual machines
Samuel T. King
,
Peter M. Chen
,
Yi-Min Wang
,
Chad Verbowski
,
Helen J. Wang
,
Jacob R. Lorch
IEEE Symposium on Security and Privacy
2006
Corpus ID: 1349303
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both…
Expand
Highly Cited
2000
Highly Cited
2000
SmartBridge: a scalable bridge architecture
T. Rodeheffer
,
C. Thekkath
,
Darrell C. Anderson
Conference on Applications, Technologies…
2000
Corpus ID: 431263
As the number of hosts attached to a network increases beyond what can be connected by a single local area network (LAN…
Expand
Highly Cited
1999
Highly Cited
1999
Failure data analysis of a LAN of Windows NT based computers
M. Kalyanakrishnam
,
Z. Kalbarczyk
,
R. Iyer
Proceedings of the 18th IEEE Symposium on…
1999
Corpus ID: 384887
This paper presents results of a failure data analysis of a LAN of Windows NT machines. Data for the study was obtained from…
Expand
1998
1998
Bounded size dictionary compression: SCk-completeness and NC algorithms
S. Agostino
,
R. Silvestri
Information and Computation
1998
Corpus ID: 9338582
1996
1996
A framework for rare event simulation of stochastic Petri nets using “RESTART”
C. Kelling
Online World Conference on Soft Computing in…
1996
Corpus ID: 12066332
For the performability evaluation of complex systems simulation remains often the only feasible method. Unfortunately, simulation…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE