Sciweavers

3686 search results - page 35 / 738
» An Approach to a Trustworthy System Architecture Using Virtu...
Sort
View
HICSS
2007
IEEE
171views Biometrics» more  HICSS 2007»
13 years 11 months ago
Unified Architecture for Large-Scale Attested Metering
We introduce a secure architecture called an attested meter for advanced metering that supports large-scale deployments, flexible configurations, and enhanced protection for consu...
Michael LeMay, George Gross, Carl A. Gunter, Sanja...
HPDC
2000
IEEE
14 years 3 days ago
Failure-Atomic File Access in an Interposed Network Storage System
This paper presents a recovery protocol for block I/O operations in Slice, a storage system architecture for highspeed LANs incorporating network-attached block storage. The goal ...
Darrell C. Anderson, Jeffrey S. Chase
CG
2005
Springer
13 years 7 months ago
Intelligent virtual environments for virtual reality art
The development of virtual reality (VR) art installations is faced with considerable difficulties, especially when one wishes to explore complex notions related to user interactio...
Marc Cavazza, Jean-Luc Lugrin, Simon Hartley, Marc...
EDBT
2000
ACM
13 years 11 months ago
Navigation-Driven Evaluation of Virtual Mediated Views
The MIX mediator systems incorporates a novel framework for navigation-driven evaluation of virtual mediated views. Its architecture allows the on-demand computation of views and q...
Bertram Ludäscher, Yannis Papakonstantinou, P...
HPCA
2007
IEEE
14 years 8 months ago
Concurrent Direct Network Access for Virtual Machine Monitors
This paper presents hardware and software mechanisms to enable concurrent direct network access (CDNA) by operating systems running within a virtual machine monitor. In a conventi...
Jeffrey Shafer, David Carr, Aravind Menon, Scott R...