Module-Level Software Streaming Loading Model Based on Hypervisor
暂无分享,去创建一个
Guojun Wang | Lian Duan | Fang Qi | Zhe Tang
[1] Yaoxue Zhang,et al. Transparent computing: Spatio-temporal extension on von Neumann architecture for cloud services , 2013 .
[2] Ying Wang,et al. Hidden OS Objects Correlated Detection Technology Based on VMM: Hidden OS Objects Correlated Detection Technology Based on VMM , 2013 .
[3] Yaoxue Zhang,et al. TransOS: a transparent computing-based operating system for the cloud , 2012, Int. J. Cloud Comput..
[4] Bin CHEN,et al. Prefetch Mechanism for On-Demand Software Deployment in Virtual Machine Environments: Prefetch Mechanism for On-Demand Software Deployment in Virtual Machine Environments , 2011 .
[5] Jie Wu,et al. Progressive or Conservative: Rationally Allocate Cooperative Work in Mobile Social Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.
[6] Jim Griffioen,et al. Reducing File System Latency using a Predictive Approach , 1994, USENIX Summer.
[7] Zhong Liang,et al. Prefetching Mechanism for On-demand Software Streaming , 2011 .
[8] YouHui Zhang,et al. Cloudow: A SaaS runtime system based on the user-level virtu-alization technology , 2012 .
[9] Yuezhi Zhou,et al. Transparent Computing: A New Paradigm for Pervasive Computing , 2006, UIC.
[10] Wo Tian. Hidden OS Objects Correlated Detection Technology Based on VMM , 2013 .
[11] Jemal H. Abawajy,et al. A trajectory privacy-preserving scheme based on query exchange in mobile social networks , 2018, Soft Comput..
[12] Wu Ming. Analysis and a case study of transparent computing implementation with UEFI , 2012, Int. J. Cloud Comput..
[13] Jemal H. Abawajy,et al. Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks , 2017, Future Gener. Comput. Syst..
[14] Cai Zhi. Prefetch Mechanism for On-Demand Software Deployment in Virtual Machine Environments , 2010 .
[15] Kim-Kwang Raymond Choo,et al. Enhancing privacy through uniform grid and caching in location-based services , 2017, Future Gener. Comput. Syst..
[16] Cedric Angelo M. Festin,et al. A P2P Network Booting Scheme Using a BitTorrent-Like Protocol , 2013, 2013 International Conference on IT Convergence and Security (ICITCS).
[17] Yong Qi,et al. Design and verification of a lightweight reliable virtual machine monitor for a many-core architecture , 2012, Frontiers of Computer Science.
[18] Jie Wu,et al. On the RSU-based secure distinguishability among vehicular flows , 2017, 2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS).
[19] Angelos Stavrou,et al. Using Hardware Features for Increased Debugging Transparency , 2015, 2015 IEEE Symposium on Security and Privacy.
[20] Qin Liu,et al. Hierarchical Multi-Authority and Attribute-Based Encryption Friend Discovery Scheme in Mobile Social Networks , 2016, IEEE Communications Letters.