Sciweavers

1234 search results - page 89 / 247
» Privacy-preserving Virtual Machine
Sort
View
JOT
2006
75views more  JOT 2006»
15 years 3 months ago
Encrypting the Java Serialized Object
The cryptographic classes incorporated into Sun's releases of the Java Virtual Machine are often used in e-commerce and other applications. A mechanism exists for signing a J...
Alan Ward
106
Voted
EDUTAINMENT
2007
Springer
15 years 10 months ago
Visualization Learning for Visually Impaired People
Virtual Environments (VE) are mainly visual experiments that exclude visually impaired people. In this paper we present an application that should allow almost everybody to “seeâ...
Patrick Salamin, Daniel Thalmann, Fréd&eacu...
122
Voted
HICSS
2010
IEEE
166views Biometrics» more  HICSS 2010»
15 years 8 months ago
VrtProf: Vertical Profiling for System Virtualization
As data centers and end users become increasingly reliant on virtualization technology, more efficient and accurate methods of profiling such systems are needed. However, under vir...
Hussam Mousa, Kshitij Doshi, Timothy Sherwood, ElM...
140
Voted
CCGRID
2007
IEEE
15 years 10 months ago
Design and Implementation of a Middleware for Data Storage in Opportunistic Grids
Shared machines in opportunistic grids typically have large quantities of unused disk space. These resources could be used to store application and checkpointing data when the mac...
Raphael Y. de Camargo, Fabio Kon
143
Voted
JVM
2004
132views Education» more  JVM 2004»
15 years 5 months ago
Solaris Zones: Operating System Support for Server Consolidation
e a new operating system abstraction for partitioning systems, allowing multiple applications to run in isolation from each other on the same physical hardware. This isolation prev...
Andrew Tucker, David Comay