Citation to this article as recorded by
Anitha, V. and N. Keerthana, 2013. An overview: Security in virtualization technology. J. Artif. Intell., 6: 112-116. CrossRefDirect Link |
Nehru, E.I., S. Sujatha, P. Seethalakshmi and N. Sridharan, 2012. Priority based load balancing in cloud for data intensive applications. J. Artif. Intel., 5: 200-206. CrossRefDirect Link |
How to cite this article
Mueen Uddin, Azizah Abdul Rahman, Asadullah Shah and Jamshed Memon, 2012. Virtualization Implementation Approach for Data Centers to Maximize Performance. Asian Journal of Scientific Research, 5: 45-57.
DOI: 10.3923/ajsr.2012.45.57
URL: https://scialert.net/abstract/?doi=ajsr.2012.45.57
DOI: 10.3923/ajsr.2012.45.57
URL: https://scialert.net/abstract/?doi=ajsr.2012.45.57