نتایج جستجو برای: vms

تعداد نتایج: 1879  

2017
SATORU OHTA

Virtualization is widely used owing to its advantages, such as flexibility, scalability, and cost reduction. One important advantage is the decrease in power consumption, which is obtained by concentrating virtual machines (VMs) into a fewer physical machines (PMs). This is done by optimally placing VMs to their hosts. This placement problem is an intractable combinatorial optimization problem....

Journal: :Cardiovascular research 2014
Ying Li Shuai Zhang Xiaoying Zhang Jing Li Xiaojie Ai Li Zhang Daohai Yu Shuping Ge Yizhi Peng Xiongwen Chen

AIMS To determine whether altered beta-adrenergic responses contribute to early cardiac dysfunction in mdx (X-linked muscular dystrophy) mice, an animal model for human Duchenne muscular dystrophy. METHODS AND RESULTS Replacement fibrosis in mdx hearts gradually increased with age, suggesting a gradual loss of cardiomyocytes. Echocardiography and intra-left ventricular haemodynamic measuremen...

Journal: :Climacteric : the journal of the International Menopause Society 2012
P Villaseca

OBJECTIVE Non-hormonal treatment for menopausal vasomotor symptoms (VMS) is needed in women in whom there are medical or personal concerns on the use of hormone therapy. This paper reviews conventional and phytochemical therapies available for the relief of VMS, on their mechanisms of action, their efficacy and safety concerns. METHODS Medline was searched through Pubmed on the names of the d...

2012
Yao-Ying Ma Carlos Cepeda Payush Chatta Lana Franklin Christopher J Evans Michael S Levine

The striatum can be divided into the DLS (dorsolateral striatum) and the VMS (ventromedial striatum), which includes NAcC (nucleus accumbens core) and NAcS (nucleus accumbens shell). Here, we examined differences in electrophysiological properties of MSSNs (medium-sized spiny neurons) based on their location, expression of DA (dopamine) D1/D2 receptors and responses to the μ-opioid receptor ago...

Journal: :The Medical journal of Australia 2015
Pragya Gartoulla Susan R Davis Roisin Worsley Robin J Bell

OBJECTIVE To document the prevalence of, and factors associated with, the use of complementary and alternative medicines (CAMs) for vasomotor symptoms (VMS) and other symptoms of menopause in Australian women aged 40-65 years. DESIGN, SETTING AND PARTICIPANTS Cross-sectional questionnaire-based study of Australian women aged 40-65 years living independently in the community. Women able to com...

2016
Yatharth Agarwal Vishnu Murale Jason Hennessey Kyle Hogan Mayank Varia

Co-locating multiple tenants’ virtual machines (VMs) on the same host underpins public clouds’ affordability, but sharing physical hardware also exposes consumer VMs to side channel attacks from adversarial co-residents. We demonstrate passive bandwidth measurement to perform traffic analysis attacks on co-located VMs. Our attacks do not assume a privileged position in the network or require an...

2010
WILLIAM J. LAYTON LI SHAN HAIBIAO ZHENG

This paper presents a stability, convergence and error analysis for two modular, projection-based variational multiscale (VMS) methods for the incompressible Naiver-Stokes equations. In VMS methods, the influence of the unresolved scales onto the resolved small scales is modeled by a Smagorinsky-type turbulent viscosity acting only on the marginally resolved scales. We analyze a method of induc...

2009
Stefan Marr Michael Haupt Stijn Timbermont Bram Adams Theo D'Hondt Pascal Costanza Wolfgang De Meuter

The upcoming many-core architectures require software developers to exploit concurrency to utilize available computational power. Today’s high-level language virtual machines (VMs), which are a cornerstone of software development, do not provide sufficient abstraction for concurrency concepts. We analyze concrete and abstract concurrency models and identify the challenges they impose for VMs. T...

Journal: :IACR Cryptology ePrint Archive 2014
Gorka Irazoqui Apecechea Mehmet Sinan Inci Thomas Eisenbarth Berk Sunar

This work exposes further vulnerabilities in virtualized cloud servers by mounting Cross-VM cache attacks in Xen and VMware VMs targeting AES running in the victim VM. Even though there exists a rich literature on cache attacks on AES, so far only a single work, demonstrating a working attack on an ARM platform running a L4Re virtualization layer has been published. Here we show that AES in a n...

1998
M. Crane R. MacKenzie R. Sass T. Himel

Current communications between the SLAC Linear Collider control system central host and the SLCmicros is built upon the SLAC developed SLCNET communication hardware and protocols. We will describe how the Internet Suite of protocols (TCP/IP) are used to replace the SLCNET protocol interface. The major communication pathways and their individual requirements are described. A proxy server is used...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید