From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Push vs. Pull: Implications of Protocol Design on Controlling Unwanted Traffic., и . SRUTI, USENIX Association, (2005)V-Recover: Virtual Machine Recovery When Live Migration Fails., , , и . IEEE Trans. Cloud Comput., 11 (3): 3289-3300 (июля 2023)Live gang migration of virtual machines., , и . HPDC, стр. 135-146. ACM, (2011)MemX: supporting large memory workloads in Xen virtual machines., и . VTDC@SC, стр. 2:1-2:8. ACM, (2007)Message from the Chairs: International Workshop on Network Design and Architecture., и . ICPP Workshops, стр. 263. IEEE Computer Society, (2004)SPARC: a security and privacy aware virtual machinecheckpointing mechanism., , , и . WPES, стр. 115-124. ACM, (2011)On the Accuracy of RFID-based Localization in a Mobile Wireless Network Testbed., , , , , и . PerCom Workshops, стр. 1-6. IEEE Computer Society, (2009)978-1-4244-3304-9.Performance Analysis of Encryption in Securing the Live Migration of Virtual Machines., , , , , , , и . CLOUD, стр. 613-620. IEEE Computer Society, (2015)Fast and live hypervisor replacement., , , , , и . VEE, стр. 45-58. ACM, (2019)ContainerVisor: Customized Control of Container Resources., , и . IC2E, стр. 190-199. IEEE, (2019)