Sciweavers

750 search results - page 136 / 150
» Virtual Environments - Framework for Virtualized Resource Ac...
Sort
View
USS
2008
13 years 10 months ago
V-NetLab: An Approach for Realizing Logically Isolated Networks for Security Experiments
Cyber security experiments with potentially malicious software can possibly damage the testbed environment and "escape" into the Internet. Due to this security concern, ...
Weiqing Sun, Varun Katta, Kumar Krishna, R. Sekar
ETS
2000
IEEE
144views Hardware» more  ETS 2000»
13 years 8 months ago
An Evaluation of Computer Mediated Communication to Support Group Discussion in Continuing Education
An evaluation of a taught module within a Post-Graduate Master of Education course is reported. Participants on the course were mainly teachers learning for continuing professiona...
Rachel M. Pilkington, Catherine L. Bennett, Sarah ...
JOT
2006
73views more  JOT 2006»
13 years 8 months ago
The Initium RJS ScreenSaver: Part 2, UNIX
This paper describes a Java-based screensaver technology for the Initium Remote Job Submission (RJS) system running on UNIX XWindows. Initium RJS is a Java Web Start (JAWS) techno...
Douglas A. Lyon, Francisco Castellanos
HPDC
2010
IEEE
13 years 9 months ago
Exploring application and infrastructure adaptation on hybrid grid-cloud infrastructure
Clouds are emerging as an important class of distributed computational resources and are quickly becoming an integral part of production computational infrastructures. An importan...
Hyunjoo Kim, Yaakoub El Khamra, Shantenu Jha, Mani...
ISW
2005
Springer
14 years 1 months ago
Device-Enabled Authorization in the Grey-System
d Abstract) Lujo Bauer, Scott Garriss, Jonathan M. McCune, Michael K. Reiter, Jason Rouse, and Peter Rutenbar Carnegie Mellon University, Pittsburgh, Pennsylvania, USA We describe ...
Lujo Bauer, Scott Garriss, Jonathan M. McCune, Mic...