Sciweavers

143 search results - page 9 / 29
» Design of a virtual computer security lab
Sort
View
CCS
2010
ACM
13 years 7 months ago
On verifying stateful dataflow processing services in large-scale cloud systems
Cloud computing needs to provide integrity assurance in order to support security sensitive application services such as critical dataflow processing. In this paper, we present a ...
Juan Du, Xiaohui Gu, Ting Yu
CANDC
2005
ACM
13 years 9 months ago
Exhibition: computational schemes for biomimetic sculpture
The Mid-Ocean Studio, Brown University’s SHAPE lab, and Goldsmiths College are collaborating on a prototype system for the automatic evolution of biomimetic sculpture using stru...
Brower Hatcher, Karl Aspelund, Andrew R. Willis, J...
ICDCS
1998
IEEE
13 years 11 months ago
Experience with Secure Multi-Processing in Java
As Java is the preferred platform for the deployment of network computers, it is appealing to run multiple applications on a single Java desktop. We experimented with using the Ja...
Dirk Balfanz, Li Gong
SIGOPSE
1998
ACM
13 years 11 months ago
Distributed virtual machines: a system architecture for network computing
Modern virtual machines, such as Java and Inferno, are emerging as network computing s. While these virtual machines provide higher-level abstractions and more sophisticated servi...
Emin Gün Sirer, Robert Grimm, Brian N. Bersha...
JUCS
2010
89views more  JUCS 2010»
13 years 5 months ago
Towards a Virtual Trusted Platform
: The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in standard PC platforms promise new approaches in building a robust virtualisati...
Martin Pirker, Ronald Toegl