Results 1 - 10
of
38,220
Table 1: Feature comparison of hypervisor- and COS- based systems
2007
"... In PAGE 4: ... Discussion: VM technologies are often embraced for their ability to provide strong isolation as well as other value-added features. Table1 provides a list of popular value-added features that attract users to VM technolo- gies, which include ability to run multiple kernels side- by-side, have administrative power (i.e.... In PAGE 4: ... As well, the more low-level ac- cess that is desired by users, such as the ability to load a kernel module, th more code is needed to preserve isolation of the relevant system. However, COSs can support the remaining features with corresponding ref- erences provided in Table1 . In fact, at least one solu- tion supporting COS-based VM migration goes a step further than hypervisor-based VM migration: it enables VM migration from one kernel version to another.... ..."
Cited by 9
Table III below compares the image sizes of various operating systems and hypervisors.
Table 1: Feature comparison of hypervisor- and COS-based systems
"... In PAGE 4: ... Discussion: VM technologies are often embraced for their ability to provide strong isolation as well as other value- added features. Table1 provides a list of popular value- added features that attract users to VM technologies, which include abilities to run multiple kernels side-by-side, have administrative power (i.e.... ..."
Table 3: The Microsoft corpus
1999
Cited by 4
Table 7: Processing Times for a 20 Input Problem *
1999
"... In PAGE 29: ...27 Search Effort (Optimal vs. Greedy) 0 10000 20000 30000 40000 50000 60000 70000 80000 90000 100000 10 12 14 16 18 20 Number of Inputs Nodes Created AO* H2 Nodes AO* H3 Nodes Greedy H2 Nodes Greedy H3 Nodes Figure 4: Optimal Search Effort Results on Moderately Large Problems Because computing times are dependent on hardware and programming characteristics, we only provide selected results in Table7 . Note that our implementation was not the most optimized as it uses extensive recursion, sequential search for partitioning the rule set and cases, and uncompressed storage of the rule and data set partitions in each OR node.... ..."
Cited by 1
Table 2. The categorical listing of the file sizes, in bytes, included in a working implementation of this demonstration. This list is expandable to include more functionality from Microsoft Invisible Computing
Table 3: Example of common functions of devices: Same functions are mapped to the same gesture; similar functions may be mapped to the same gesture if this is intuitive and no other function is overloaded.
1997
"... In PAGE 13: ... Depending on the gesture commands are sent to the devices and feedback is applied. The correlation of gestures and commands is shown in Table3 . If the dialogue nishes by time out or by the pointing gesture or a certain termination gesture the control ow enters the direction determination (Figure 12).... In PAGE 30: ...evice at a time. First a device is selected by the unique pointer click. Depending on the selected device, the gesture will execute a certain command. Table3 shows a possible mapping. The stars indicate that the device in that column supports the function of the row.... ..."
Cited by 4
Table 1: Example of common functions of devices: Same functions are mapped to the same gesture; similar functions may be mapped to the same gesture if this is intuitive and no other function is overloaded.
1997
"... In PAGE 2: ... 1). Further control is ac- cording to Table1 , where one gesture is used for each line. Every gesture is mapped to several similar tasks from di erent devices2, which reduces the number of gestures and makes the dialogue more intuitive.... ..."
Cited by 6
Results 1 - 10
of
38,220