Sciweavers

24741 search results - page 146 / 4949
» Virtual Network Computing
Sort
View
106
Voted
COMCOM
2008
82views more  COMCOM 2008»
15 years 2 months ago
Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing
People enjoy the convenience of on-line services, Automated Teller Machines (ATMs), and pervasive computing, but online environments, ATMs, and pervasive computing may bring many r...
Ming Lei, Yang Xiao, Susan V. Vrbsky, Chung-Chih L...
106
Voted
HPDC
2000
IEEE
15 years 7 months ago
CAVEStudy: An Infrastructure for Computational Steering in Virtual Reality Environments
We present the CAVEStudy system that enables scientists to interactively steer a simulation from a virtual reality (VR) environment. No modification to the source code is necessa...
Luc Renambot, Henri E. Bal, Desmond Germans, Hans ...
CN
2010
146views more  CN 2010»
15 years 2 months ago
Badumna: A decentralised network engine for virtual environments
Many of today's virtual environment applications, such as massively multi-player online games, involve a large and rapidly changing set of users. The server-based architectur...
Santosh Kulkarni, Scott Douglas, David Churchill
141
Voted
SOSP
2003
ACM
15 years 11 months ago
Terra: a virtual machine-based platform for trusted computing
We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security requirements to run simultaneously on commodity har...
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenbl...
113
Voted
JPDC
2006
83views more  JPDC 2006»
15 years 2 months ago
Virtual Leashing: Creating a computational foundation for software protection
We introduce Virtual Leashing,1 a new technique for software protection and control. The leashing process removes small fragments of code, pervasive throughout the application, an...
Ori Dvir, Maurice Herlihy, Nir Shavit