Sciweavers

24741 search results - page 146 / 4949
» Virtual Network Computing
Sort
View
COMCOM
2008
82views more  COMCOM 2008»
15 years 5 months ago
Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing
People enjoy the convenience of on-line services, Automated Teller Machines (ATMs), and pervasive computing, but online environments, ATMs, and pervasive computing may bring many r...
Ming Lei, Yang Xiao, Susan V. Vrbsky, Chung-Chih L...
HPDC
2000
IEEE
15 years 9 months ago
CAVEStudy: An Infrastructure for Computational Steering in Virtual Reality Environments
We present the CAVEStudy system that enables scientists to interactively steer a simulation from a virtual reality (VR) environment. No modification to the source code is necessa...
Luc Renambot, Henri E. Bal, Desmond Germans, Hans ...
159
Voted
CN
2010
146views more  CN 2010»
15 years 5 months ago
Badumna: A decentralised network engine for virtual environments
Many of today's virtual environment applications, such as massively multi-player online games, involve a large and rapidly changing set of users. The server-based architectur...
Santosh Kulkarni, Scott Douglas, David Churchill
SOSP
2003
ACM
16 years 1 months ago
Terra: a virtual machine-based platform for trusted computing
We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security requirements to run simultaneously on commodity har...
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenbl...
133
Voted
JPDC
2006
83views more  JPDC 2006»
15 years 4 months ago
Virtual Leashing: Creating a computational foundation for software protection
We introduce Virtual Leashing,1 a new technique for software protection and control. The leashing process removes small fragments of code, pervasive throughout the application, an...
Ori Dvir, Maurice Herlihy, Nir Shavit