Research Article
Study of Immune-Based Intrusion Detection Technology in Virtual Machines for Cloud Computing Environment
Table 2
Illustrations of tested computation intensive programs.
| Program names | Meanings |
| 164.gzip | The compression and decompression operations of a set of files | 175.vpr | According to specific algorithms, placement and routing operations for field-programmable gate array circuit | 186.crafty | Chess programs, find the next move in view of the board layout | 252.eon | Probability ray tracing used to create a 3d object image | 254.gap | Solving the problem of correlation analysis and calculation of discrete mathematics |
|
|