Sciweavers

1169 search results - page 75 / 234
» Migration without Virtualization
Sort
View
ICDCS
2005
IEEE
15 years 8 months ago
Virtual Leashing: Internet-Based Software Piracy Protection
Software-splitting is a technique for protecting software from piracy by removing code fragments from an application and placing them on a remote trusted server. The server provid...
Ori Dvir, Maurice Herlihy, Nir Shavit
TRUST
2010
Springer
15 years 8 months ago
Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture
Virtualization has been purported to be a panacea for many security problems. We analyze the feasibility of constructing an integrity-protected hypervisor on contemporary x86 hardw...
Amit Vasudevan, Jonathan M. McCune, Ning Qu, Leend...
VW
1998
Springer
153views Virtual Reality» more  VW 1998»
15 years 7 months ago
Grounding Virtual Worlds in Reality
We suggest in this article a new paradigm for the representation of data, which is best suited for the real-time visualization and sonorisation of complex systems, real or simulat...
Guillaume Hutzler, Bernard Gortais, Alexis Drogoul
AOSD
2007
ACM
15 years 7 months ago
Tribe: a simple virtual class calculus
Beginning with BETA, a range of programming language mechanisms such as virtual classes (class-valued attributes of objects) have been developed to allow inheritance in the presen...
Dave Clarke, Sophia Drossopoulou, James Noble, Tob...
116
Voted
JNW
2007
113views more  JNW 2007»
15 years 3 months ago
Using Virtualization to Provide Interdomain QoS-enabled Routing
— Today, the most important aspect related with the Internet architecture is its ossification representing the difficulties to introduce evolutions in the architecture as a way...
Fábio Luciano Verdi, Maurício F. Mag...