Author of the publication

MemHole: An Efficient Black-Box Approach to Consolidate Memory in Virtualization Platform.

, , and . ICPP Workshops, page 608-609. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Trustworthy Resource Selection Approach in Grid with Fuzzy Reputation Aggregation., , and . AWIC, volume 43 of Advances in Soft Computing, page 142-147. Springer, (2007)Running stability of hydraulic confined piston engine based on virtual prototype., , , and . RAM, page 291-294. IEEE, (2011)Deep Learning-based Cooperative Trail Following for Multi-Robot System., , , and . IJCNN, page 1-8. IEEE, (2018)HESA: The Construction and Evaluation of Hierarchical Software Feature Repository., , , , and . SEKE, page 624-631. Knowledge Systems Institute Graduate School, (2013)Correlation-based software search by leveraging software term database., , , , , and . Frontiers Comput. Sci., 12 (5): 923-938 (2018)Who Will Become a Long-Term Contributor?: A Prediction Model based on the Early Phase Behaviors., , , , and . Internetware, page 9:1-9:10. ACM, (2018)Intelligent Computing: The Latest Advances, Challenges and Future, , , , , , , , , and 11 other author(s). (2022)cite arxiv:2211.11281.Together: A Hybrid Overlay for Application-Layer Multicast in Heterogeneous Environment., , , and . GPC, volume 5036 of Lecture Notes in Computer Science, page 364-372. Springer, (2008)ZebraX: A Model for Service Composition with Multiple QoS Constraints., , , , and . GPC, volume 4459 of Lecture Notes in Computer Science, page 614-626. Springer, (2007)AT-RBAC: An Authentication Trustworthiness-Based RBAC Model., , , and . GCC Workshops, volume 3252 of Lecture Notes in Computer Science, page 343-350. Springer, (2004)