Sciweavers

3341 search results - page 377 / 669
» A Communication Virtual Machine
Sort
View
CIKM
2010
Springer
15 years 3 months ago
Towards a data-centric view of cloud security
Cloud security issues have recently gained traction in the research community, with much of the focus primarily concentrated on securing the operating systems and virtual machines...
Wenchao Zhou, Micah Sherr, William R. Marczak, Zhu...
169
Voted
ASWEC
2009
IEEE
15 years 2 months ago
From Requirements to Embedded Software - Formalising the Key Steps
Failure of a design to satisfy a system's requirements can result in schedule and cost overruns. When using current approaches, ensuring requirements are satisfied is often d...
Toby Myers, R. Geoff Dromey
142
Voted
INTENV
2010
14 years 12 months ago
Tales From a Pod
In this Science-Fiction Prototyping article, I present an imaginative forward look at how artificial intelligence and virtual environments might change the nature of future educati...
Vic Callaghan
CCS
2011
ACM
14 years 5 months ago
VMCrypt: modular software architecture for scalable secure computation
Garbled circuits play a key role in secure computation. Unlike previous work, which focused mainly on efficiency and automation aspects of secure computation, in this paper we foc...
Lior Malka
123
Voted
ICCCN
2008
IEEE
15 years 11 months ago
Publish/Subscribe Service in CAN-based P2P Networks: Dimension Mismatch and The Random Projection Approach
Abstract—CAN is a well-known DHT technique for contentbased P2P networks, where each node is assigned a zone in a virtual coordinate space to store the index of the data hashed i...
Duc A. Tran, Thinh Nguyen