Virtualization has been purported to be a panacea for many security problems. We analyze the feasibility of constructing an integrity-protected hypervisor on contemporary x86 hardw...
Amit Vasudevan, Jonathan M. McCune, Ning Qu, Leend...
The emergence of the Semantic Web has produced several changes in the way in which applications are developed. Besides, the Semantic Web idea has changed itself since its initial a...
— Pervasive and ubiquitous computing is enabling the implementation of “smart environments”, i.e., environments where applications support and enhance the abilities of their ...
This paper describes an alternative architecture for voicemail data retrieval on the move. It is comprised of three distinct components: a speech recognizer, a text summarizer and...
Konstantinos Koumpis, Charalampos Ladas, Steve Ren...
This paper describes PRISM, a distributed sharedmemory architecture that relies on a tightly integrated hardware and operating system design for scalable and reliable performance....