Sciweavers

1234 search results - page 75 / 247
» Privacy-preserving Virtual Machine
Sort
View
SISW
2005
IEEE
15 years 9 months ago
Towards Protecting Sensitive Files in a Compromised System
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Xin Zhao, Kevin Borders, Atul Prakash
130
Voted
USENIX
2008
15 years 6 months ago
A Multi-Site Virtual Cluster System for Wide Area Networks
A virtual cluster is a promising technology for reducing management costs and improving capacity utilization in datacenters and computer centers. However, recent cluster virtualiz...
Takahiro Hirofuchi, Takeshi Yokoi, Tadashi Ebara, ...
ICALT
2006
IEEE
15 years 9 months ago
Instruction Through The Ages: Building Pervasive Virtual Instructors for Life Long Learning
A pervasive virtual instructor is an artificially intelligent instructor that may appear transparent to the learner or appear in the form of a threedimensional graphical character...
Jayfus T. Doswell
133
Voted
SIGCSE
2005
ACM
156views Education» more  SIGCSE 2005»
15 years 9 months ago
Experiences teaching operating systems using virtual platforms and linux
Operating system courses teach students much more when they provide hands-on kernel-level project experience with a real operating system. However, enabling a large class of stude...
Jason Nieh, Chris Vaill
239
Voted
SENSYS
2006
ACM
15 years 9 months ago
Run-time dynamic linking for reprogramming wireless sensor networks
From experience with wireless sensor networks it has become apparent that dynamic reprogramming of the sensor nodes is a useful feature. The resource constraints in terms of energ...
Adam Dunkels, Niclas Finne, Joakim Eriksson, Thiem...