Sciweavers

422 search results - page 54 / 85
» Risk management for distributed authorization
Sort
View
SOSP
2003
ACM
16 years 1 months ago
Xen and the art of virtualization
Numerous systems have been designed which use virtualization to subdivide the ample resources of a modern computer. Some require specialized hardware, or cannot support commodity ...
Paul Barham, Boris Dragovic, Keir Fraser, Steven H...
IEEESP
2007
98views more  IEEESP 2007»
15 years 4 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
CCE
2004
15 years 4 months ago
Pharmaceutical supply chains: key issues and strategies for optimisation
Supply chain optimisation is now a major research theme in process operations and management. A great deal of research has been undertaken on facility location and design, invento...
Nilay Shah
C5
2004
IEEE
15 years 8 months ago
Design for an Extensible Croquet-Based Framework to Deliver a Persistent, Unified, Massively Multi-User, and Self-Organizing Vir
We describe a design for a collaborative Virtual Learning Environment (VLE) to support massively multi-user and multi-institutional learning communities. This architecture extends...
Mark P. McCahill, Julian Lombardi
MMS
2008
15 years 4 months ago
Canonical processes for creating personalized semantically rich multimedia presentations
Authoring of multimedia content can be considered as composing media assets such as images, videos, text, and audio in time, space, and interaction into a coherent multimedia pres...
Ansgar Scherp