Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,119,079 papers from all fields of science
Search
Sign In
Create Free Account
Virtual hosting
Known as:
Addon domain
, Host
, Name-based Virtual Host
Expand
Virtual hosting is a method for hosting multiple domain names (with separate handling of each name) on a single server (or pool of servers). This…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
29 relations
Analog
Android
Bare-metal server
Cherokee Web Server
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
A Container-Based Virtual Laboratory for Internet Security e-Learning
Johannes Sianipar
,
Christian Willems
,
C. Meinel
2016
Corpus ID: 38005456
Tele-Lab is a platform for e-learning in Internet security with a special focus on teaching by means of handson experience. A…
Expand
2015
2015
The application of Virtualization technology in Grid Computing
Cheng-Long Zhang
,
Dan He
,
Jianlian Xiao
,
Yang Li
International Congress of Mathematicans
2015
Corpus ID: 62067392
In this paper, the author discussed the current popular the grid computation technique and the virtualization technology…
Expand
2013
2013
Benefits of the virtualization technologies with intrusion detection and prevention systems
Murat Çaliskan
,
Mustafa Ozsiginan
,
Emin Kuğu
Advanced Industrial Conference on…
2013
Corpus ID: 16294716
In recent years, virtualization technologies were settled faster than anyone imagined and got placed big areas in our lives…
Expand
2011
2011
A Multi-level Architecture for Collecting and Managing Monitoring Information in Cloud Environments
G. Katsaros
,
Georgina Gallizo
,
Roland Kübert
,
Tinghe Wang
,
J. O. Fitó
,
D. Henriksson
International Conference on Cloud Computing and…
2011
Corpus ID: 42811769
While the Cloud computing paradigm is maturing and gaining wide acceptance, topics like Quality of Service assurance and resource…
Expand
2010
2010
Notice of RetractionA Static Analysis Tool for Detecting Web Application Injection Vulnerabilities for ASP Program
Xin-hua Zhang
,
Zhi-jian Wang
2nd International Conference on E-business and…
2010
Corpus ID: 13930469
Publicly reported vulnerability in recent years strong growth of the Web Application , Cross-site scripting (XSS) and SQL…
Expand
2008
2008
Meeting customer needs
C. Gresty
,
T. Dimitrakos
,
G. Thanos
,
P. Warren
2008
Corpus ID: 9435776
2006
2006
A Scalable Peer-to-peer Protocol Enabling Efficient and Flexible Search
Reaz Ahmed
,
R. Boutaba
,
D. Cheriton
2006
Corpus ID: 6978223
Efficient discovery of information, based on partial knowledge, is a challenging problem faced by many large scale distributed…
Expand
2006
2006
Trust and security in virtual organisations
Paul Kearney
2006
Corpus ID: 62735116
Technologies such as Web Services and grid computing are making it technically possible for companies to co-operate more closely…
Expand
2006
2006
Centralized Security Policy Support for Virtual Machine
Anh-Quynh Nguyen
,
R. Ando
,
Yoshiyasu Takefuji
LiSA
2006
Corpus ID: 5098025
For decades, researchers have pointed out that Mandatory Access Control (MAC) is an effective method to protect computer systems…
Expand
1999
1999
Network Working Group Internet-Draft
1999
Corpus ID: 264607031
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE