Sciweavers

811 search results - page 49 / 163
» Modeling and Virtualization for Secure Computing Environment...
Sort
View
WSC
2008
15 years 10 days ago
Comparing designs for computer simulation experiments
The use of simulation as a modeling and analysis tool is wide spread. Simulation is an enabling tool for experimenting virtually on a validated computer environment. Often the und...
Rachel T. Johnson, Bradley Jones, John W. Fowler, ...
TON
2002
144views more  TON 2002»
14 years 9 months ago
Algorithms for provisioning virtual private networks in the hose model
Virtual Private Networks (VPNs) provide customers with predictable and secure network connections over a shared network. The recently proposed hose model for VPNs allows for great...
Amit Kumar, Rajeev Rastogi, Abraham Silberschatz, ...
HPDC
2012
IEEE
13 years 12 days ago
VNET/P: bridging the cloud and high performance computing through fast overlay networking
networking with a layer 2 abstraction provides a powerful model for virtualized wide-area distributed computing resources, including for high performance computing (HPC) on collec...
Lei Xia, Zheng Cui, John R. Lange, Yuan Tang, Pete...
FTDCS
1997
IEEE
15 years 2 months ago
The Saga Security System: A Security Architecture for Open Distributed Systems
In the paper we present an overview of Saga Security System, a security architecture in open distributed systems. An agent in Saga Security System is called a Saga Agent. The auth...
Masakazu Soshi, Mamoru Maekawa
ESCIENCE
2006
IEEE
15 years 4 months ago
User Programmable Virtualized Networks
This paper introduces the concept of a User Programmable Virtualized Network, which allows networks to deliver application specific services using network element components that ...
Robert J. Meijer, Rudolf J. Strijkers, Leon Gomman...