Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Virtual machine

Known as: Process virtual machine, Virtual machines, Application virtual machine 
In computing, a virtual machine (VM) is an emulation of a computer system. Virtual machines are based on computer architectures and provide… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
The emergence of cloud computing based on virtualization technologies brings huge opportunities to host virtual resource at low… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Review
2017
Review
2017
Abstract The bin packing problem is a well-studied problem in combinatorial optimization. In the classical bin packing problem… Expand
  • table 1
  • figure 1
  • table 2
  • figure 3
  • table 3
Is this relevant?
Review
2017
Review
2017
There is considerable pressure to define the key requirements of 5G, develop 5G standards, and perform technology trials as… Expand
  • table I
  • figure 1
  • figure 2
  • figure 3
  • table II
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Local oscillator power is supplied to an array of single-ended microwave mixers by an offset horn. Each mixer has an integral… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Virtualization is a hot topic in operating systems these days. It is useful in many scenarios: server consolidation, virtual test… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Virtualization can provide significant benefits in data centers by enabling virtual machine migration to eliminate hotspots. We… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Today’s architectures for intrusion detection force the IDS designer to make a difficult choice. If the IDS resides on the host… Expand
  • figure 1
  • table 1
  • figure 2
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security… Expand
  • figure 1
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Composed of tens of thousands of tiny devices with very limited resources ("motes"), sensor networks are subject to novel systems… Expand
  • figure 6
  • figure 7
  • figure 8
  • figure 10
  • figure 11
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Current system loggers have two problems: they depend on the integrity of the operating system being logged, and they do not save… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?