Sciweavers

3601 search results - page 242 / 721
» The Future of Virtualization Technology
Sort
View
ASPLOS
2010
ACM
15 years 11 months ago
Virtualized and flexible ECC for main memory
We present a general scheme for virtualizing main memory errorcorrection mechanisms, which map redundant information needed to correct errors into the memory namespace itself. We ...
Doe Hyun Yoon, Mattan Erez
IVA
2005
Springer
15 years 10 months ago
Direct Manipulation Like Tools for Designing Intelligent Virtual Agents
If intelligent virtual agents are to become widely adopted it is vital that they can be designed using the user friendly graphical tools that are used in other areas of graphics. H...
Marco Gillies, Dale Robeterson, Daniel Ballin
INFOCOM
2002
IEEE
15 years 9 months ago
Restoration Algorithms for Virtual Private Networks in the Hose Model
—A Virtual Private Network (VPN) aims to emulate the services provided by a private network over the shared Internet. The endpoints of e connected using abstractions such as Virt...
Giuseppe F. Italiano, Rajeev Rastogi, Bülent ...
CCS
2008
ACM
15 years 6 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
JCP
2007
154views more  JCP 2007»
15 years 4 months ago
Introducing Virtual Private Overlay Network Services in Large Scale Grid Infrastructures
—The computational Grid concept is gaining great popularity as the best way to deliver access to a wide range of distributed computing and data resources. But, as Grids move from...
Francesco Palmieri