Sciweavers

377 search results - page 43 / 76
» Operating system virtualization: practice and experience
Sort
View
USENIX
2008
14 years 6 days ago
LeakSurvivor: Towards Safely Tolerating Memory Leaks for Garbage-Collected Languages
Continuous memory leaks severely hurt program performance and software availability for garbage-collected programs. This paper presents a safe method, called LeakSurvivor, to tole...
Yan Tang, Qi Gao, Feng Qin
ITS
2010
Springer
167views Multimedia» more  ITS 2010»
14 years 2 months ago
Investigating the Relationship between Presence and Learning in a Serious Game
We investigate the role of presence in a serious game for intercultural communication and negotiation skills by comparing two interfaces: a 3D version with animated virtual humans ...
H. Chad Lane, Matthew J. Hays, Daniel Auerbach, Ma...
USITS
2001
13 years 11 months ago
Alpine: A User-Level Infrastructure for Network Protocol Development
In traditional operating systems, modifying the network protocol code is a tedious and error-prone task, largely because the networking stack resides in the kernel. For this reaso...
David Ely, Stefan Savage, David Wetherall
ISDA
2008
IEEE
14 years 4 months ago
Rough Set Granularity in Mobile Web Pre-caching
Mobile Web pre-caching (Web prefetching and caching) is an explication of performance enhancement and storage limitation of mobile devices. In this paper, we present the granulari...
Sarina Sulaiman, Siti Mariyam Hj. Shamsuddin, Ajit...
IC
2003
13 years 11 months ago
Remote Real Laboratory: Linux Installation and Configuration
: Remote real laboratories deal with performing real lab experiments remotely via Internet. Recent advances in Internet/web technologies and computer-controlled instrumentation all...
Alassane Diop, Amine Berqia, Jürgen Harms