Sciweavers

811 search results - page 76 / 163
» Modeling and Virtualization for Secure Computing Environment...
Sort
View
OTM
2007
Springer
14 years 2 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
CCS
2007
ACM
14 years 3 months ago
Non-volatile memory and disks: avenues for policy architectures
As computing models change, so too do the demands on storage. Distributed and virtualized systems introduce new vulnerabilities, assumptions, and performance requirements on disks...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
AFRIGRAPH
2009
ACM
14 years 3 months ago
Virtual relighting of a Roman statue head from Herculaneum: a case study
High-fidelity computer graphics offer the possibility for archaeologists to put excavated cultural heritage artefacts virtually back into their original setting and illumination ...
Jassim Happa, Mark Williams, Glen Turley, Graeme E...
USENIX
2004
13 years 10 months ago
Xen and the Art of Repeated Research
Xen is an x86 virtual machine monitor produced by the University of Cambridge Computer Laboratory and released under the GNU General Public License. Performance results comparing ...
Bryan Clark, Todd Deshane, Eli Dow, Stephen Evanch...
TJS
2002
136views more  TJS 2002»
13 years 8 months ago
A Virtual Test Facility for the Simulation of Dynamic Response in Materials
The Center for Simulating Dynamic Response of Materials at the California Institute of Technology is constructing a virtual shock physics facility for studying the response of vari...
Julian Cummings, Michael Aivazis, Ravi Samtaney, R...