Sciweavers

1234 search results - page 180 / 247
» Privacy-preserving Virtual Machine
Sort
View
149
Voted
ACL
2010
15 years 1 months ago
Demonstration of a Prototype for a Conversational Companion for Reminiscing about Images
This paper describes an initial prototype demonstrator of a Companion, designed as a platform for novel approaches to the following: 1) The use of Information Extraction (IE) tech...
Yorick Wilks, Roberta Catizone, Alexiei Dingli, We...
144
Voted
SERVICEWAVE
2010
15 years 1 months ago
Simulating Autonomic SLA Enactment in Clouds Using Case Based Reasoning
Abstract. With the emergence of Cloud Computing resources of physical machines have to be allocated to virtual machines (VMs) in an ondemand way. However, the efficient allocation ...
Michael Maurer, Ivona Brandic, Rizos Sakellariou
147
Voted
GCC
2009
Springer
15 years 1 months ago
Accounting and Billing for Federated Cloud Infrastructures
Emerging Cloud computing infrastructures provide computing resources on demand based on postpaid principles. For example, the RESERVOIR project develops an infrastructure capable o...
Erik Elmroth, Fermín Galán Má...
122
Voted
CORR
2011
Springer
197views Education» more  CORR 2011»
14 years 7 months ago
Securing The Kernel via Static Binary Rewriting and Program Shepherding
Recent Microsoft security bulletins show that kernel vulnerabilities are becoming more and more important security threats. Despite the pretty extensive security mitigations many ...
Piotr Bania
156
Voted
SIGCOMM
2012
ACM
13 years 6 months ago
FairCloud: sharing the network in cloud computing
e network, similar to CPU and memory, is a critical and shared resource in the cloud. However, unlike other resources, it is neither shared proportionally to payment, nor do cl...
Lucian Popa 0002, Gautam Kumar, Mosharaf Chowdhury...