Sciweavers

3686 search results - page 46 / 738
» An Approach to a Trustworthy System Architecture Using Virtu...
Sort
View
SIGMETRICS
2010
ACM
153views Hardware» more  SIGMETRICS 2010»
13 years 2 months ago
Using virtualization and live migration in a scalable mobile wireless testbed
Laboratory-based mobile wireless testbeds such as MeshTest and the CMU Wireless Emulator are powerful platforms that allow users to perform controlled, repeatable, mobile wireless ...
Dongwoon Hahn, Ginnah Lee, Brenton D. Walker, Matt...
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 7 months ago
A secure email login system using virtual password
In today's world password compromise by some adversaries is common for different purpose. In ICC 2008 Lei et al. proposed a new user authentication system based on the virtual...
Nishant Doshi
AGI
2008
13 years 9 months ago
An Integrative Methodology for Teaching Embodied Non-Linguistic Agents, Applied to Virtual Animals in Second Life
A teaching methodology called Imitative-Reinforcement-Corrective (IRC) learning is described, and proposed as a general approach for teaching embodied non-linguistic AGI systems. I...
Ben Goertzel, Cassio Pennachin, Nil Geisweiller, M...
WORDS
2005
IEEE
14 years 1 months ago
Progressive Ranking and Composition of Web Services Using Covering Arrays
Major computer companies and government agencies are adopting Web Services (WS) technology. Web services must ensure interoperability and security, and be reliable and trustworthy...
Charles J. Colbourn, Yinong Chen, Wei-Tek Tsai
CONCURRENCY
2010
127views more  CONCURRENCY 2010»
13 years 7 months ago
Formation of virtual organizations in grids: a game-theoretic approach
Applications require the composition of resources to execute in a grid computing environment. The Grid Service Providers (GSPs), the owners of the computational resources, must for...
Thomas E. Carroll, Daniel Grosu