Sciweavers

425 search results - page 33 / 85
» Virtual private caches
Sort
View
FAST
2011
12 years 11 months ago
Capo: Recapitulating Storage for Virtual Desktops
Shared storage underlies most enterprise VM deployments because it is an established technology that administrators are familiar with and because it good job of protecting data. H...
Mohammad Shamma, Dutch T. Meyer, Jake Wires, Maria...
VR
2003
IEEE
14 years 25 days ago
Managing Collaboration in the nanoManipulator
We designed, developed, deployed, and evaluated the Collaborative nanoManipulator (CnM), a distributed, collaborative virtual environment system supporting remote scientific colla...
Thomas C. Hudson, Aron T. Helser, Diane H. Sonnenw...
HICSS
2003
IEEE
105views Biometrics» more  HICSS 2003»
14 years 25 days ago
New Software Development Paradigms and Possible Adoption for Security
EGovernment would be a lot easier if it could be handled like eBusiness. Unfortunately there are organizational and legal obstacles that make it virtually impossible. The security...
Matthias Günter, Michael Gisler, Bianca von B...
AMC
2007
75views more  AMC 2007»
13 years 7 months ago
Fingerprint images encryption via multi-scroll chaotic attractors
This paper proposes a chaotic fingerprint images encryption approach. An image of a fingerprint is encrypted via a twodimensional (2D) chaotic sequence obtained from multi-scrol...
Fengling Han, Jiankun Hu, Xinghuo Yu, Yi Wang
IEEEPACT
2005
IEEE
14 years 1 months ago
Maximizing CMP Throughput with Mediocre Cores
In this paper we compare the performance of area equivalent small, medium, and large-scale multithreaded chip multiprocessors (CMTs) using throughput-oriented applications. We use...
John D. Davis, James Laudon, Kunle Olukotun