Sciweavers

3686 search results - page 113 / 738
» An Approach to a Trustworthy System Architecture Using Virtu...
Sort
View
VEE
2009
ACM
613views Virtualization» more  VEE 2009»
14 years 5 months ago
BitVisor: a thin hypervisor for enforcing i/o device security
Virtual machine monitors (VMMs), including hypervisors, are a popular platform for implementing various security functionalities. However, traditional VMMs require numerous compon...
Takahiro Shinagawa, Hideki Eiraku, Kouichi Tanimot...
CONEXT
2008
ACM
13 years 12 months ago
Towards high performance virtual routers on commodity hardware
Modern commodity hardware architectures, with their multiple multi-core CPUs and high-speed system interconnects, exhibit tremendous power. In this paper, we study performance lim...
Norbert Egi, Adam Greenhalgh, Mark Handley, Micka&...
SAC
2009
ACM
14 years 5 months ago
A personalized framework for trust assessment
The number of computational trust models has been increasing rapidly in recent years, yet their applications for automating trust evaluation are still limited. The main obstacle i...
Trung Dong Huynh
PRDC
2007
IEEE
14 years 4 months ago
Model Based Development of Safety-Critical Systems Using Template Based Code Generation
Model-based development is state of the art in software engineering, due to its potential regarding automatic code synthesis. Nevertheless for embedded systems, where there exists...
Matthias Regensburger, Christian Buckl, Alois Knol...
ECCV
2010
Springer
13 years 11 months ago
Camera Pose Estimation Using Images of Planar Mirror Reflections
The image of a planar mirror reflection (IPMR) can be interpreted as a virtual view of the scene, acquired by a camera with a pose symmetric to the pose of the real camera with res...
Rui Rodrigues, João P. Barreto, Urbano Nune...