Sciweavers

344 search results - page 9 / 69
» Software Process Modeling and Execution Within Virtual Envir...
Sort
View
LISA
2007
13 years 10 months ago
Secure Isolation of Untrusted Legacy Applications
Existing applications often contain security holes that are not patched until after the system has already been compromised. Even when software updates are available, applying the...
Shaya Potter, Jason Nieh, Matt Selsky
GRID
2004
Springer
14 years 1 months ago
From Sandbox to Playground: Dynamic Virtual Environments in the Grid
Much experience has been gained with the protocols and mechanisms needed for discovery and allocation of remote computational resources. However, the preparation of a remote compu...
Katarzyna Keahey, Karl Doering, Ian T. Foster
CBSE
2006
Springer
13 years 11 months ago
Virtualization of Service Gateways in Multi-provider Environments
Abstract. Today we see more and more services being brought to connected homes, such as entertainment or home automation. These services are published and operated by a variety of ...
Yvan Royon, Stéphane Frénot, Frederi...
VEE
2009
ACM
146views Virtualization» more  VEE 2009»
14 years 2 months ago
Achieving 10 Gb/s using safe and transparent network interface virtualization
: © Achieving 10 Gb/s using Safe and Transparent Network Interface Virtualization Kaushik Kumar Ram, Jose Renato Santos, Yoshio Turner, Alan L. Cox, Scott Rixner HP Laboratories H...
Kaushik Kumar Ram, Jose Renato Santos, Yoshio Turn...
HPCN
2000
Springer
13 years 11 months ago
Modelling Control Systems in an Event-Driven Coordination Language
The paper presents the implementation of a railway control system, as a means of assessing the potential of coordination languages to be used for modelling software architectures f...
Theophilos A. Limniotes, George A. Papadopoulos