Sciweavers

142 search results - page 25 / 29
» Computer Forensic Analysis in a Virtual Environment
Sort
View
EMSOFT
2011
Springer
13 years 11 months ago
RT-Xen: towards real-time hypervisor scheduling in xen
As system integration becomes an increasingly important challenge for complex real-time systems, there has been a significant demand for supporting real-time systems in virtualiz...
Sisu Xi, Justin Wilson, Chenyang Lu, Christopher D...
NSDI
2010
15 years 1 months ago
Mugshot: Deterministic Capture and Replay for JavaScript Applications
Mugshot is a system that captures every event in an executing JavaScript program, allowing developers to deterministically replay past executions of web applications. Replay is us...
James Mickens, Jeremy Elson, Jon Howell
95
Voted
CHI
2001
ACM
15 years 12 months ago
The impact of eye gaze on communication using humanoid avatars
In this paper we describe an experiment designed to investigate the importance of eye gaze in humanoid avatars representing people engaged in conversation. We compare responses to...
Maia Garau, Mel Slater, Simon Bee, Martina Angela ...
CLUSTER
2006
IEEE
15 years 5 months ago
JOSHUA: Symmetric Active/Active Replication for Highly Available HPC Job and Resource Management
Most of today‘s HPC systems employ a single head node for control, which represents a single point of failure as it interrupts an entire HPC system upon failure. Furthermore, it...
Kai Uhlemann, Christian Engelmann, Stephen L. Scot...
CLUSTER
2008
IEEE
14 years 11 months ago
Translating Service Level Objectives to lower level policies for multi-tier services
Service providers and their customers agree on certain quality of service guarantees through Service Level Agreements (SLA). An SLA contains one or more Service Level Objectives (S...
Yuan Chen, Subu Iyer, Xue Liu, Dejan S. Milojicic,...