Sciweavers

3686 search results - page 37 / 738
» An Approach to a Trustworthy System Architecture Using Virtu...
Sort
View
HPDC
2007
IEEE
14 years 2 months ago
An architecture for virtual organization (VO)-based effective peering of content delivery networks
The proprietary nature of existing Content Delivery Networks (CDNs) means they are closed and do not naturally cooperate, resulting in “islands” of CDNs. Finding ways for dist...
Al-Mukaddim Khan Pathan, James Broberg, Kris Buben...
VEE
2006
ACM
115views Virtualization» more  VEE 2006»
14 years 1 months ago
Live updating operating systems using virtualization
Many critical IT infrastructures require non-disruptive operations. However, the operating systems thereon are far from perfect that patches and upgrades are frequently applied, i...
Haibo Chen, Rong Chen, Fengzhe Zhang, Binyu Zang, ...
NDSS
2003
IEEE
14 years 1 months ago
A Virtual Machine Introspection Based Architecture for Intrusion Detection
Today’s architectures for intrusion detection force the IDS designer to make a difficult choice. If the IDS resides on the host, it has an excellent view of what is happening i...
Tal Garfinkel, Mendel Rosenblum
WSC
2004
13 years 9 months ago
Applying a Cognitive Architecture to Control of Virtual Non-Player Characters
CHI Systems, under contract to the U. S. Army Research Institute, is developing an immersive training system, called Virtual Environment Cultural Training for Operational Readines...
Chris McCollum, Charles Barba, Thomas Santarelli, ...
WOWMOM
2005
ACM
133views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations
Distributed trust and reputation management mechanisms are often proposed as a means of providing assurance in dynamic and open environments by enabling principals to building up ...
Mohamed Ahmed, Daniele Quercia, Stephen Hailes