Application of UML for hardware design based on design process model

R Damasevicius, V Stuikys - ASP-DAC 2004: Asia and South …, 2004 - ieeexplore.ieee.org
We address a problem of reusing and customizing soft IP components by introducing a
concept of design process-a series of common, well-defined and well-proven domain …

When dynamic VM migration falls under the control of VM users

K Lazri, S Laniepce… - 2013 IEEE 5th International …, 2013 - ieeexplore.ieee.org
Security of multi-tenancy in cloud platforms raises a growing interest since research has
revealed that the sharing of resources constitutes a vector of vulnerability. In this paper, we …

A recursive filter for phase velocity assisted shape-based tracking of cardiac non-rigid motion

JC McEachen, FG Meyer, RT Constable… - Proceedings of IEEE …, 1995 - ieeexplore.ieee.org
A framework for tracking pointwise periodic non-rigid motion of the heart's left ventricular
(LV) wall is presented which incorporates information from two different magnetic resonance …

Reconsidering intrusion monitoring requirements in shared cloud platforms

K Lazri, S Laniepce… - … Conference on Availability …, 2013 - ieeexplore.ieee.org
Multi-tenancy is the core feature that enables efficiency and cost effectiveness of cloud
computing. However, it brings several new security concerns. Ensuring'strong …

[PDF][PDF] Sistemas virtualizados–uma visão geral

LP Lotti, AB Prado - Instituto de Computação–Unicamp, Campinas/SP …, 2010 - ic.unicamp.br
RESUMO O presente trabalho possui como objetivo descrever o contexto evolutivo dos
sistemas virtualizados no que tange aos seus conceitos, diferenças de implementação …

[PDF][PDF] Reconsidering isolation in iaas clouds: A security perspective

K Lazri, S Laniepce, J Ben-Othman - C&ESAR 2012, 2012 - cesar-conference.org
Multi-tenancy is the core feature that enables efficiency and cost effectiveness of cloud
computing. However, it brings several new security concerns. Ensuring'strong …

Sistemas de detecção de intrusão virtualizados para computação em nuvem

LS MELO - 2013 - monografias.ufma.br
O contexto da segurança na computação em nuvem tem recebido muito investimento e
atenção por parte das empresas e organizações interessadas na utilização desta …