Sciweavers

425 search results - page 36 / 85
» Virtual private caches
Sort
View
OZCHI
2005
ACM
14 years 1 months ago
Spy-resistant keyboard: more secure password entry on public touch screen displays
Current software interfaces for entering text on touch screen devices mimic existing mechanisms such as keyboard typing or handwriting. These techniques are poor for entering priv...
Desney S. Tan, Pedram Keyani, Mary Czerwinski
JNSM
2010
110views more  JNSM 2010»
13 years 2 months ago
Distributed Automatic Configuration of Complex IPsec-Infrastructures
The Internet Protocol Security Architecture IPsec is hard to deploy in large, nested, or dynamic scenarios. The major reason for this is the need for manual configuration of the cr...
Michael Rossberg, Guenter Schaefer, Thorsten Struf...
CAL
2006
13 years 7 months ago
Adopting system call based address translation into user-level communication
User-level communication alleviates the software overhead of the communication subsystem by allowing applications to access the network interface directly. For that purpose, effici...
Moon-Sang Lee, Sang-Kwon Lee, Joonwon Lee, Seung R...
DSN
2011
IEEE
12 years 7 months ago
Resource and virtualization costs up in the cloud: Models and design choices
—Virtualization offers the potential for cost-effective service provisioning. For service providers who make significant investments in new virtualized data centers in support of...
Daniel Gmach, Jerry Rolia, Ludmila Cherkasova
HICSS
2005
IEEE
191views Biometrics» more  HICSS 2005»
14 years 1 months ago
Business Models for Online Communities: The Case of the Virtual Worlds Industry in China
The rapid growth of Internet usage has enabled many new online communities to develop. A particularly interesting phenomenon that has arisen through Internet communities is the vi...
Ian MacInnes, Lili Hu