Sciweavers

12673 search results - page 2356 / 2535
» Learning while designing
Sort
View
126
Voted
VEE
2009
ACM
146views Virtualization» more  VEE 2009»
15 years 9 months ago
Demystifying magic: high-level low-level programming
r of high-level languages lies in their abstraction over hardware and software complexity, leading to greater security, better reliability, and lower development costs. However, o...
Daniel Frampton, Stephen M. Blackburn, Perry Cheng...
131
Voted
VEE
2009
ACM
613views Virtualization» more  VEE 2009»
15 years 9 months ago
BitVisor: a thin hypervisor for enforcing i/o device security
Virtual machine monitors (VMMs), including hypervisors, are a popular platform for implementing various security functionalities. However, traditional VMMs require numerous compon...
Takahiro Shinagawa, Hideki Eiraku, Kouichi Tanimot...
163
Voted
VEE
2009
ACM
171views Virtualization» more  VEE 2009»
15 years 9 months ago
Dynamic memory balancing for virtual machines
Virtualization essentially enables multiple operating systems and applications to run on one physical computer by multiplexing hardware resources. A key motivation for applying vi...
Weiming Zhao, Zhenlin Wang
146
Voted
WWW
2009
ACM
15 years 9 months ago
A game based approach to assign geographical relevance to web images
Geographical context is very important for images. Millions of images on the Web have been already assigned latitude and longitude information. Due to the rapid proliferation of s...
Yuki Arase, Xing Xie, Manni Duan, Takahiro Hara, S...
122
Voted
CCS
2009
ACM
15 years 9 months ago
Scalable onion routing with torsk
We introduce Torsk, a structured peer-to-peer low-latency anonymity protocol. Torsk is designed as an interoperable replacement for the relay selection and directory service of th...
Jon McLachlan, Andrew Tran, Nicholas Hopper, Yongd...
« Prev « First page 2356 / 2535 Last » Next »