Sciweavers

6 search results - page 2 / 2
» Security Requirements for RFID Computing Systems
Sort
View
SOSP
2003
ACM
15 years 10 months ago
Xen and the art of virtualization
Numerous systems have been designed which use virtualization to subdivide the ample resources of a modern computer. Some require specialized hardware, or cannot support commodity ...
Paul Barham, Boris Dragovic, Keir Fraser, Steven H...