Sciweavers

143 search results - page 9 / 29
» Design of a virtual computer security lab
Sort
View
CCS
2010
ACM
14 years 11 months ago
On verifying stateful dataflow processing services in large-scale cloud systems
Cloud computing needs to provide integrity assurance in order to support security sensitive application services such as critical dataflow processing. In this paper, we present a ...
Juan Du, Xiaohui Gu, Ting Yu
CANDC
2005
ACM
15 years 26 days ago
Exhibition: computational schemes for biomimetic sculpture
The Mid-Ocean Studio, Brown University’s SHAPE lab, and Goldsmiths College are collaborating on a prototype system for the automatic evolution of biomimetic sculpture using stru...
Brower Hatcher, Karl Aspelund, Andrew R. Willis, J...
98
Voted
ICDCS
1998
IEEE
15 years 3 months ago
Experience with Secure Multi-Processing in Java
As Java is the preferred platform for the deployment of network computers, it is appealing to run multiple applications on a single Java desktop. We experimented with using the Ja...
Dirk Balfanz, Li Gong
91
Voted
SIGOPSE
1998
ACM
15 years 3 months ago
Distributed virtual machines: a system architecture for network computing
Modern virtual machines, such as Java and Inferno, are emerging as network computing s. While these virtual machines provide higher-level abstractions and more sophisticated servi...
Emin Gün Sirer, Robert Grimm, Brian N. Bersha...
82
Voted
JUCS
2010
89views more  JUCS 2010»
14 years 9 months ago
Towards a Virtual Trusted Platform
: The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in standard PC platforms promise new approaches in building a robust virtualisati...
Martin Pirker, Ronald Toegl