Sciweavers

811 search results - page 139 / 163
» Modeling and Virtualization for Secure Computing Environment...
Sort
View
JUCS
2002
116views more  JUCS 2002»
13 years 8 months ago
Bounded Flooding Routing Algorithm for Provisioning the Globally Optimal Route in a Hierarchical ATM Network
: ATM virtual path (VP) contains bundles of virtual channels (VCs). A VP layer network can be used as a server layer network of VC layer networks and each VC layer network can be a...
Daniel Won-Kyu Hong, Choong Seon Hong, Dong-Sik Yu...
CONIELECOMP
2006
IEEE
14 years 2 months ago
Integrating Advanced GLSL Shading and XML Agents into a Learning-Oriented 3D Engine
Most of the existing 3D engines are overwhelmingly complex and do not integrate support for virtual characters. We have developed a teaching oriented 3D engine with support for su...
Edgar Velázquez-Armendáriz, Erik Mil...
CCS
2000
ACM
14 years 9 days ago
PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet
The Internet provides an environment where two parties, who are virtually strangers to each other, can make connections and do business together. Before any actual business starts...
Ting Yu, Xiaosong Ma, Marianne Winslett
IMC
2004
ACM
14 years 2 months ago
A framework for malicious workload generation
Malicious traffic from self-propagating worms and denialof-service attacks constantly threatens the everyday operation of Internet systems. Defending networks from these threats d...
Joel Sommers, Vinod Yegneswaran, Paul Barford
SIGMOD
2012
ACM
242views Database» more  SIGMOD 2012»
11 years 11 months ago
Dynamic management of resources and workloads for RDBMS in cloud: a control-theoretic approach
As cloud computing environments become explosively popular, dealing with unpredictable changes, uncertainties, and disturbances in both systems and environments turns out to be on...
Pengcheng Xiong