نتایج جستجو برای: vms sign
تعداد نتایج: 57452 فیلتر نتایج به سال:
As users of “big data” applications expect fresh results, we witness a new breed of stream processing systems (SPS) that are designed to scale to large numbers of cloud-hosted machines. Such systems face new challenges: (i) to benefit from the “pay-as-you-go” model of cloud computing, they must scale out on demand, acquiring additional virtual machines (VMs) and parallelising operators when the...
OS Virtual Machines (OS VMs) were introduced in the 1960s to enable time-sharing of expensive hardware. In spite of rapidly falling hardware prices, OS VMs are still popular today. What makes them particularly interesting and useful is the capability to perform fine granular and secure logging of system execution. I claim that this is a fundamental property of OS VMs that real systems do not po...
Computer security students benefit from hands-on experience applying security tools and techniques to attack and defend vulnerable systems. Virtual machines (VMs) provide an effective way of sharing targets for hacking. However, developing these hacking challenges is time consuming, and once created, essentially static. That is, once the challenge has been "solved" there is no remaining challen...
Virtual Interacting Network CommunIty (Vinci) is a software architecture that exploits virtualization to share in a secure way an information and communication technology infrastructure among a set of users with distinct security levels and reliability requirements. To this purpose, Vinci decomposes users into communities, each consisting of a set of users, their applications, a set of services...
How can applications be deployed on the cloud to achieve maximum performance? This question is challenging to address with the availability of a wide variety of cloud Virtual Machines (VMs) with different performance capabilities. The research reported in this paper addresses the above question by proposing a six step benchmarking methodology in which a user provides a set of weights that indic...
In virtual machine environments each application is often run in its own virtual machine (VM), isolating it from other applications running on the same physical machine. Contention for memory, disk space, and network bandwidth among virtual machines, coupled with an inability to share due to the isolation virtual machines provide, leads to heavy resource utilization. Additionally, VMs increase ...
OBJECTIVE To update and expand The North American Menopause Society's evidence-based position on nonhormonal management of menopause-associated vasomotor symptoms (VMS), previously a portion of the position statement on the management of VMS. METHODS NAMS enlisted clinical and research experts in the field and a reference librarian to identify and review available evidence. Five different ele...
The Voynich manuscript (VMS) is the book dated as 15 th-16 th century, written using specific and smart coding methods. This article describes the methods how it was analyzed and how coding keys were found. It is also shows the VMS author's method of coding.
The TA-XT21 texture analyzer (TA) was used to evaluate vitelline membrane strength (VMS). Fresh and aged (1 wk at 25 C) eggs (n = 48 eggs x 2 replications) were evaluated. Fresh and aged eggs were further divided into two groups of yolk only or whole egg (with intact albumen). Yolk index, Haugh units, pH, broken-out egg weights, VMS, yolk viscosity, and scanning electron microscopy (SEM) images...
Infrastructure as a Service (IaaS) provides virtual machines (VMs) to the users and its system administrators often manage the user VMs using privileged VMs called the management VM. However, the administrators are not always trustworthy from users’ point of view. If the administrators allow outside attackers to intrude in the management VM, the attackers can easily steal sensitive information ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید