Login / Signup
Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor.
John Scott Robin
Cynthia E. Irvine
Published in:
USENIX Security Symposium (2000)
Keyphrases
</>
statistical analysis
quantitative analysis
data sets
case study
database
learning algorithm
sensor networks
e government
cost effective
virtual machine