Sciweavers

1169 search results - page 117 / 234
» Migration without Virtualization
Sort
View
INFOCOM
1997
IEEE
15 years 7 months ago
Design of a Gigabit ATM Switch
This paper describes the design and implementation of a gigabit ATM switching system supporting link rates from 150 Mb/s to 2.4 Gb/s, with a uniquely e cient multicastswitch archi...
Thomas J. Chaney, J. Andrew Fingerhut, Margaret Fl...
ESORICS
2008
Springer
15 years 5 months ago
CPU Bugs, CPU Backdoors and Consequences on Security
In this paper, we present the security implications of x86 processor bugs or backdoors on operating systems and virtual machine monitors. We will not try to determine whether the b...
Loïc Duflot
MVA
2007
110views Computer Vision» more  MVA 2007»
15 years 4 months ago
Synthesis Arbitrary Views from Two Images Based on Improved View Morphing Technique
In this paper we propose a method which can morph a high free virtual viewpoint image keeping the epipolar geometry relations based on View Morphing technique. It is works just by...
Huagang Liang, Shogo Tokai, Hiroyuki Hase
LISA
2001
15 years 4 months ago
Crypto Blunders
Cryptography has emerged as an enormously important component of the networked world. People are hesitant to trust the World Wide Web and e-commerce without the protections crypto...
Steve Burnett
IJVR
2007
72views more  IJVR 2007»
15 years 3 months ago
MACBETH: Management of Avatar Conflict by Employment of a Technique Hybrid
—When a virtual environment system prevents a user’s avatar hand from penetrating virtual objects, the seen and felt positions of the hand separate. We propose a new method for...
Eric Burns, Sharif Razzaque, Mary C. Whitton, Fred...