Sciweavers

277 search results - page 14 / 56
» Virtualization Techniques in Network Emulation Systems
Sort
View
122
Voted
EUROMICRO
2004
IEEE
15 years 7 months ago
Intrusion Detection in Virtual Machine Environments
A virtual machine is a software replica of an underlying real machine. Multiple virtual machines can operate on the same host machine concurrently, without interfere each other. S...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
111
Voted
IM
1997
15 years 5 months ago
Customer Management and Control of Broadband VPN Services
We present an architecture for customer management and control of a broadband VPN service. The architecture is aimed at giving the VPN customer a high level of control over the tr...
Mun Choon Chan, Aurel A. Lazar, Rolf Stadler
169
Voted
SI3D
2012
ACM
13 years 11 months ago
Tabletop Ensemble: touch-enabled virtual percussion instruments
We present an interactive virtual percussion instrument system, Tabletop Ensemble, that can be used by a group of collaborative users simultaneously to emulate playing music in re...
Zhimin Ren, Ravish Mehra, Jason Coposky, Ming C. L...
125
Voted
VR
2009
IEEE
188views Virtual Reality» more  VR 2009»
15 years 10 months ago
Crafting Personalized Facial Avatars Using Editable Portrait and Photograph Example
Computer-generated facial avatars have been increasingly used in a variety of virtual reality applications. Emulating the real-world face sculpting process, we present an interact...
Tanasai Sucontphunt, Zhigang Deng, Ulrich Neumann
143
Voted
ANCS
2010
ACM
15 years 1 months ago
sNICh: efficient last hop networking in the data center
: sNICh: Efficient Last Hop Networking in the Data Center Kaushik Kumar Ram, Jayaram Mudigonda, Alan L. Cox, Scott Rixner, Partha Ranganathan, Jose Renato Santos HP Laboratories H...
Kaushik Kumar Ram, Jayaram Mudigonda, Alan L. Cox,...