• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 38,220
Next 10 →

Table 1 Category of hypervisors

in unknown title
by unknown authors

Table 1: Feature comparison of hypervisor- and COS- based systems

in Container-based operating system virtualization: a scalable, high-performance alternative to hypervisors
by Stephen Soltesz, Herbert Pötzl, Marc E. Fiuczynski, Andy Bavier, Larry Peterson 2007
"... In PAGE 4: ... Discussion: VM technologies are often embraced for their ability to provide strong isolation as well as other value-added features. Table1 provides a list of popular value-added features that attract users to VM technolo- gies, which include ability to run multiple kernels side- by-side, have administrative power (i.e.... In PAGE 4: ... As well, the more low-level ac- cess that is desired by users, such as the ability to load a kernel module, th more code is needed to preserve isolation of the relevant system. However, COSs can support the remaining features with corresponding ref- erences provided in Table1 . In fact, at least one solu- tion supporting COS-based VM migration goes a step further than hypervisor-based VM migration: it enables VM migration from one kernel version to another.... ..."
Cited by 9

Table III below compares the image sizes of various operating systems and hypervisors.

in A Hypervisor for Embedded Computing
by Philip A Reames, Ellick Chan, Francis David, Jeffrey Carlyle, Roy H. Campbell

Table 1: Feature comparison of hypervisor- and COS-based systems

in Container-basedOperatingSystemVirtualization: AScalable,High-performanceAlternativetoHypervisors
by Stephen Soltesz, Andy Bavier, Herbert P-otzl, Larry Peterson, Marc E. Fiuczynski
"... In PAGE 4: ... Discussion: VM technologies are often embraced for their ability to provide strong isolation as well as other value- added features. Table1 provides a list of popular value- added features that attract users to VM technologies, which include abilities to run multiple kernels side-by-side, have administrative power (i.e.... ..."

Table 3: The Microsoft corpus

in The PLUG Project: Parallel corpora in Linkoping, uppsala, goteborg: Aims and achievements
by Anna Sågvall Hein 1999
Cited by 4

Table [43] For Microsoft Windows.

in tering: A Review
by Thomas A. Lasko A, Jui G. Bhagwat C, Kelly H. Zou C, Lucila Ohno-machado A 2001
Cited by 2

Table 7: Processing Times for a 20 Input Problem *

in Optimizing Expert Systems: Heuristics for Efficiently Generating
by Michael V. Mannino, Vijay S. Mookerjee 1999
"... In PAGE 29: ...27 Search Effort (Optimal vs. Greedy) 0 10000 20000 30000 40000 50000 60000 70000 80000 90000 100000 10 12 14 16 18 20 Number of Inputs Nodes Created AO* H2 Nodes AO* H3 Nodes Greedy H2 Nodes Greedy H3 Nodes Figure 4: Optimal Search Effort Results on Moderately Large Problems Because computing times are dependent on hardware and programming characteristics, we only provide selected results in Table7 . Note that our implementation was not the most optimized as it uses extensive recursion, sequential search for partitioning the rule set and cases, and uncompressed storage of the rule and data set partitions in each OR node.... ..."
Cited by 1

Table 2. The categorical listing of the file sizes, in bytes, included in a working implementation of this demonstration. This list is expandable to include more functionality from Microsoft Invisible Computing

in CONNECTING SENSORS AND ROBOTS THROUGH THE INTERNET BY INTEGRATING MICROSOFT ROBOTICS STUDIO AND EMBEDDED WEB SERVICES
by Oscar Almeida, Johannes Helander, Henrik Nielsen, Nishith Khantal

Table 3: Example of common functions of devices: Same functions are mapped to the same gesture; similar functions may be mapped to the same gesture if this is intuitive and no other function is overloaded.

in Technical Details and Ergonomical Aspects of Gesture Recognition applied in Intelligent Home Environments
by Markus Kohler 1997
"... In PAGE 13: ... Depending on the gesture commands are sent to the devices and feedback is applied. The correlation of gestures and commands is shown in Table3 . If the dialogue nishes by time out or by the pointing gesture or a certain termination gesture the control ow enters the direction determination (Figure 12).... In PAGE 30: ...evice at a time. First a device is selected by the unique pointer click. Depending on the selected device, the gesture will execute a certain command. Table3 shows a possible mapping. The stars indicate that the device in that column supports the function of the row.... ..."
Cited by 4

Table 1: Example of common functions of devices: Same functions are mapped to the same gesture; similar functions may be mapped to the same gesture if this is intuitive and no other function is overloaded.

in System Architecture and Techniques for Gesture Recognition in Unconstraint Environments
by M.R.J. Kohler 1997
"... In PAGE 2: ... 1). Further control is ac- cording to Table1 , where one gesture is used for each line. Every gesture is mapped to several similar tasks from di erent devices2, which reduces the number of gestures and makes the dialogue more intuitive.... ..."
Cited by 6
Next 10 →
Results 1 - 10 of 38,220
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University