Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Virtual machine

Known as: Process virtual machine, Virtual machines, Application virtual machine 
In computing, a virtual machine (VM) is an emulation of a computer system. Virtual machines are based on computer architectures and provide… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
Contrary to using distant and centralized cloud data center resources, employing decentralized resources at the edge of a network… Expand
  • figure 1
  • figure 3
  • figure 5
  • figure 4
  • figure 6
Review
2019
Review
2019
Cloud computing and network slicing are essential concepts of forthcoming 5G mobile systems. Network slices are essentially… Expand
  • table I
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Review
2018
Review
2018
Mobile edge computing (MEC) provides a promising approach to significantly reduce network operational cost and improve quality of… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Review
2018
Review
2018
Abstract In the growing age of cloud computing, shared computing and storage resources can be accessed over the Internet… Expand
Highly Cited
2007
Highly Cited
2007
Virtualization is a hot topic in operating systems these days. It is useful in many scenarios: server consolidation, virtual test… Expand
  • figure 1
  • figure 2
Highly Cited
2007
Highly Cited
2007
  • H. Beck, R. Hesse
  • 9th International Conference on Electrical Power…
  • 2007
  • Corpus ID: 42096573
Demands in the area of electrical energy generation and distribution, as a result of energy policies, are leading to far reaching… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Highly Cited
2003
Highly Cited
2003
We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security… Expand
  • figure 1
Highly Cited
2003
Highly Cited
2003
Today’s architectures for intrusion detection force the IDS designer to make a difficult choice. If the IDS resides on the host… Expand
  • figure 1
  • table 1
  • figure 2
Highly Cited
2002
Highly Cited
2002
Composed of tens of thousands of tiny devices with very limited resources ("motes"), sensor networks are subject to novel systems… Expand
  • figure 6
  • figure 7
  • figure 8
  • figure 10
  • figure 11
Highly Cited
2002
Highly Cited
2002
Current system loggers have two problems: they depend on the integrity of the operating system being logged, and they do not save… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2