Sciweavers

425 search results - page 27 / 85
» Virtual private caches
Sort
View
AIMS
2008
Springer
14 years 1 months ago
N2N: A Layer Two Peer-to-Peer VPN
The Internet was originally designed as a flat data network delivering a multitude of protocols and services between equal peers. Currently, after an explosive growth fostered by ...
Luca Deri, Richard Andrews
USENIX
2003
13 years 9 months ago
A Multi-User Virtual Machine
Recent efforts aimed at improving the scalability of the JavaTM platform have focused primarily on the safe collocation of multiple applications in the virtual machine. This is of...
Grzegorz Czajkowski, Laurent Daynès, Ben Ti...
CHI
2009
ACM
13 years 5 months ago
Bezier lights: establishing virtual boundaries in indoor environments
In this paper we introduce Bezier Lights, an intelligent lighting system that allows users to intuitively establish virtual boundaries in indoor environments. Boundaries can be ea...
Yuichiro Takeuchi
CSE
2009
IEEE
14 years 2 months ago
Security Implications of Virtualization: A Literature Study
— Data centers accumulate corporate and personal data at a rapid pace. Driven by economy of scale and the high bandwidth of today’s network connections, more and more businesse...
André van Cleeff, Wolter Pieters, Roel Wier...
OSDI
2006
ACM
14 years 7 months ago
Making Information Flow Explicit in HiStar
HiStar is a new operating system designed to minimize the amount of code that must be trusted. HiStar provides strict information flow control, which allows users to specify preci...
David Mazières, Eddie Kohler, Nickolai Zeld...