Sciweavers

811 search results - page 7 / 163
» Modeling and Virtualization for Secure Computing Environment...
Sort
View
EUROSYS
2007
ACM
14 years 4 months ago
Adaptive control of virtualized resources in utility computing environments
Data centers are often under-utilized due to over-provisioning as well as time-varying resource demands of typical enterprise applications. One approach to increase resource utili...
Pradeep Padala, Kang G. Shin, Xiaoyun Zhu, Mustafa...
SIGCSE
2002
ACM
135views Education» more  SIGCSE 2002»
13 years 7 months ago
Introducing computer science through animation and virtual worlds
We describe a course for non-majors that teaches computer science concepts and programming by creating simple animations and building 2D and 3D virtual worlds. Students work with ...
Susan H. Rodger
HICSS
2010
IEEE
237views Biometrics» more  HICSS 2010»
14 years 24 days ago
SafeFox: A Safe Lightweight Virtual Browsing Environment
1 The browser has become a popular attack vector for implanting code on computer operating systems. Equally critical, important sessions, such as online banking, must be protected ...
Jiang Wang, Yih Huang, Anup K. Ghosh
VR
1999
IEEE
154views Virtual Reality» more  VR 1999»
13 years 11 months ago
A Virtual Assembly Design Environment
The Virtual Assembly Design Environment (VADE) is a Virtual Reality (VR) based engineering application which allows engineers to evaluate, analyze, and plan the assembly of mechan...
Sankar Jayaram, Yong Wang, Uma Jayaram, Kevin W. L...
ACSAC
2005
IEEE
14 years 1 months ago
Looking Back at the Bell-La Padula Model
The Bell-La Padula security model produced conceptual tools for the analysis and design of secure computer systems. Together with its sibling engineering initiatives, it identifi...
David Elliott Bell