Sciweavers

13913 search results - page 2542 / 2783
» models 2007
Sort
View
LISA
2007
15 years 6 months ago
Secure Isolation of Untrusted Legacy Applications
Existing applications often contain security holes that are not patched until after the system has already been compromised. Even when software updates are available, applying the...
Shaya Potter, Jason Nieh, Matt Selsky
LISA
2007
15 years 6 months ago
PoDIM: A Language for High-Level Configuration Management
The high rate of requirement changes make system administration a complex task. This complexity is further influenced by the increasing scale, unpredictable behaviour of software ...
Thomas Delaet, Wouter Joosen
USENIX
2007
15 years 6 months ago
Energy Management for Hypervisor-Based Virtual Machines
Current approaches to power management are based on operating systems with full knowledge of and full control over the underlying hardware; the distributed nature of multi-layered...
Jan Stoess, Christian Lang, Frank Bellosa
USS
2008
15 years 6 months ago
Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST
The State of Ohio commissioned the EVEREST study in late summer of 2007. The study participants were charged with an analysis of the usability, stability, and security of all voti...
Kevin R. B. Butler, William Enck, Harri Hursti, St...
ACMACE
2007
ACM
15 years 6 months ago
Transmedial interactions and digital games
As virtual worlds and games grow in both personal and cultural importance, present limitations in access to them is increasingly limiting their ability to achieve their potential....
Shaowen Bardzell, Vicky Wu, Jeffrey Bardzell, Nick...
« Prev « First page 2542 / 2783 Last » Next »