Sciweavers

88 search results - page 10 / 18
» A Virtual Laboratory for IT Security Education
Sort
View
PDP
2008
IEEE
14 years 1 months ago
System-Level Virtualization for High Performance Computing
System-level virtualization has been a research topic since the 70’s but regained popularity during the past few years because of the availability of efficient solution such as...
Geoffroy Vallée, Thomas Naughton, Christian...
VISUALIZATION
1997
IEEE
13 years 11 months ago
Global tele-immersion
The term Tele-Immersion was first used in October 1996 as the title of a workshop the Electronic Visualization Laboratory (EVL) at University of Illinois at Chicago (UIC) organize...
Thomas A. DeFanti
TIM
2010
108views Education» more  TIM 2010»
13 years 2 months ago
Reversible Watermarking by Modulation and Security Enhancement
This paper presents a watermarking algorithm that is suitable for the data represented in floating- or fixed-point numbers. By keeping the modulation information, every value in th...
Hao-Tian Wu, Yiu-ming Cheung
SIGCSE
2005
ACM
124views Education» more  SIGCSE 2005»
14 years 1 months ago
The virtual network system
The goal of our work is to give students a hands-on experience designing, deploying and debugging parts of the Internet infrastructure, such as an Internet router that routes real...
Martin Casado, Nick McKeown
CORR
2010
Springer
225views Education» more  CORR 2010»
13 years 7 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...