Sciweavers

1472 search results - page 96 / 295
» Access control in virtual environments
Sort
View
IVA
2009
Springer
15 years 11 months ago
Methodologies for the User Evaluation of the Motion of Virtual Humans
Abstract. Virtual humans are employed in many interactive applications, including (serious) games. Their motion should be natural and allow interaction with its surroundings and ot...
Sander E. M. Jansen, Herwin van Welbergen
USENIX
2007
15 years 7 months ago
Energy Management for Hypervisor-Based Virtual Machines
Current approaches to power management are based on operating systems with full knowledge of and full control over the underlying hardware; the distributed nature of multi-layered...
Jan Stoess, Christian Lang, Frank Bellosa
ACSW
2003
15 years 6 months ago
A Secure Pervasive Environment
This paper explores the complications encountered when attempting to create a secure pervasive computing environment. The model introduced in this paper is primarily conceptual. T...
Patrick G. McLean
SIGCSE
2008
ACM
189views Education» more  SIGCSE 2008»
15 years 4 months ago
Operational experience with a virtual networking laboratory
Virtual laboratories are a potential replacement for standard laboratory facilities. Use of these virtual resources can reduce cost and maintenance overheads for teaching institut...
Charlie Wiseman, Ken Wong, Tilman Wolf, Sergey Gor...
SAC
2000
ACM
15 years 9 months ago
The Mobile Agent Technology to Support and to Access Museum Information
The global scenario put together by communication networks determines new opportunities towards the realization of Internetbased distributed services in many complex and composite...
Paolo Bellavista, Antonio Corradi, Andrea Tomasi