Login / Signup
A Survey of Virtualization Technologies Focusing on Untrusted Code Execution.
Yan Wen
Jinjing Zhao
Gang Zhao
Hua Chen
Dongxia Wang
Published in:
IMIS (2012)
Keyphrases
</>
code generation
operating system
virtual machine
java virtual machine
source code
control flow
cloud computing
data flow
emerging technologies
privacy preserving
third party
storage management
data mining
open source
data integration