Sciweavers

2421 search results - page 301 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
145
Voted
NSDI
2007
15 years 7 months ago
Black-box and Gray-box Strategies for Virtual Machine Migration
Virtualization can provide significant benefits in data centers by enabling virtual machine migration to eliminate hotspots. We present Sandpiper, a system that automates the ta...
Timothy Wood, Prashant J. Shenoy, Arun Venkatarama...
DAC
2004
ACM
16 years 6 months ago
Abstraction of assembler programs for symbolic worst case execution time analysis
ion of Assembler Programs for Symbolic Worst Case Execution Time Analysis Tobias Schuele Tobias.Schuele@informatik.uni-kl.de Klaus Schneider Klaus.Schneider@informatik.uni-kl.de Re...
Klaus Schneider, Tobias Schüle
132
Voted
LISA
2000
15 years 6 months ago
Tracing Anonymous Packets to Their Approximate Source
Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These addresses are spoofed, created by a malicious program ...
Hal Burch, Bill Cheswick
WSC
2004
15 years 6 months ago
Factors Affecting the Expectation of Casualties in the Virtual Range Toxicity Model
The Virtual Range (VR) is an environment that integrates in a seamless fashion several models to improve complex systems visualization. A complex system is a non-linear system of ...
José A. Sepúlveda, Luis C. Rabelo, J...
193
Voted
CGF
2010
139views more  CGF 2010»
14 years 12 months ago
Visualization of Large-Scale Urban Models through Multi-Level Relief Impostors
In this paper, we present an efficient approach for the interactive rendering of large-scale urban models, which can be integrated seamlessly with virtual globe applications. Our ...
Carlos Andújar, Pere Brunet, Antoni Chica, ...