Research Article

Study of Immune-Based Intrusion Detection Technology in Virtual Machines for Cloud Computing Environment

Table 2

Illustrations of tested computation intensive programs.

Program namesMeanings

164.gzipThe compression and decompression operations of a set of files
175.vprAccording to specific algorithms, placement and routing operations for field-programmable gate array circuit
186.craftyChess programs, find the next move in view of the board layout
252.eonProbability ray tracing used to create a 3d object image
254.gapSolving the problem of correlation analysis and calculation of discrete mathematics