From post

Design and Implementation of Resource Management Tool for Virtual Machine.

, , , и . FGIT-FGCN/DCA, том 350 из Communications in Computer and Information Science, стр. 17-24. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Automated Generation of Test Cases for Smart Contract Security Analyzers., и . IEEE Access, (2020)A Study on the Generation of Artificial Fish's Behavior Using Elasticity Force., , , и . FGIT-MulGraB/BSBT/IUrC, том 353 из Communications in Computer and Information Science, стр. 65-72. Springer, (2012)Building Security Requirements Using State Transition Diagram at Security Threat Location., , , , , и . CIS (2), том 3802 из Lecture Notes in Computer Science, стр. 451-456. Springer, (2005)Kinematical Access for Realistic Behavior Generation of Artificial Fish., , , , , и . ALPIT, стр. 293-297. IEEE Computer Society, (2007)Feedback Scheduling for Realtime Task on Xen Virtual Machine., , , и . FGIT-FGCN (2), том 266 из Communications in Computer and Information Science, стр. 283-291. Springer, (2011)Kimchi: A Binary Rewriting Defense Against Format String Attacks., , , , , и . WISA, том 3786 из Lecture Notes in Computer Science, стр. 179-193. Springer, (2005)Low Latency Scheduling on Multi BOOST Environment., , , и . ICHIT (2), том 310 из Communications in Computer and Information Science, стр. 720-724. Springer, (2012)Monitoring and Feedback Tools for Realtime Workloads for Xen Virtual Machine., , , , и . ICITCS, том 120 из Lecture Notes in Electrical Engineering, стр. 151-161. Springer, (2011)Protection Against Format String Attacks by Binary Rewriting., , , , , и . CIS (2), том 3802 из Lecture Notes in Computer Science, стр. 303-308. Springer, (2005)Development of Evaluation Simulator of New Power Sources Using the LabVIEW Software., , , , и . FGIT-GDC, том 261 из Communications in Computer and Information Science, стр. 87-94. Springer, (2011)