Sciweavers

1169 search results - page 220 / 234
» Migration without Virtualization
Sort
View
92
Voted
CCS
2001
ACM
15 years 6 months ago
Secure Open Systems for Protecting Privacy and Digital Services
This paper describes and analyzes a system architecture that enables consumers to access services and content from multiple providers without jeopardizing the privacy interests of...
David W. Kravitz, Kim-Ee Yeoh, Nicol So
TES
2001
Springer
15 years 6 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
IUI
2000
ACM
15 years 6 months ago
Adaptive medical information delivery combining user, task and situation models
Medical information delivery for users with different levels of expertise will be required for the manned mission to Mars due to limited potential for communication with Earth. Th...
Luis Francisco-Revilla, Frank M. Shipman III
SIGGRAPH
2000
ACM
15 years 6 months ago
Style machines
We approach the problem of stylistic motion synthesis by learning motion patterns from a highly varied set of motion capture sequences. Each sequence may have a distinct choreogra...
Matthew Brand, Aaron Hertzmann
POPL
1999
ACM
15 years 6 months ago
Typed Memory Management in a Calculus of Capabilities
An increasing number of systems rely on programming language technology to ensure safety and security of low-level code. Unfortunately, these systems typically rely on a complex, ...
Karl Crary, David Walker, J. Gregory Morrisett