Sciweavers

24741 search results - page 155 / 4949
» Virtual Network Computing
Sort
View
ACSAC
2005
IEEE
15 years 10 months ago
Automated and Safe Vulnerability Assessment
As the number of system vulnerabilities multiplies in recent years, vulnerability assessment has emerged as a powerful system security administration tool that can identify vulner...
Fanglu Guo, Yang Yu, Tzi-cker Chiueh
VEE
2009
ACM
146views Virtualization» more  VEE 2009»
15 years 11 months ago
Achieving 10 Gb/s using safe and transparent network interface virtualization
: © Achieving 10 Gb/s using Safe and Transparent Network Interface Virtualization Kaushik Kumar Ram, Jose Renato Santos, Yoshio Turner, Alan L. Cox, Scott Rixner HP Laboratories H...
Kaushik Kumar Ram, Jose Renato Santos, Yoshio Turn...
CHI
2007
ACM
15 years 6 months ago
The validity of a virtual human experience for interpersonal skills education
Any new tool introduced for education needs to be validated. We developed a virtual human experience called the Virtual Objective Structured Clinical Examination (VOSCE). In the V...
Kyle Johnsen, Andrew Raij, Amy O. Stevens, D. Scot...
IPPS
2007
IEEE
15 years 11 months ago
Biomolecular Path Sampling Enabled by Processing in Network Storage
Computationally complex and data intensive atomic scale biomolecular simulation is enabled via Processing in Network Storage (PINS): a novel distributed system framework to overco...
Paul Brenner, Justin M. Wozniak, Douglas Thain, Aa...
RAID
2010
Springer
15 years 3 months ago
HyperCheck: A Hardware-Assisted Integrity Monitor
Abstract. Over the past few years, virtualization has been employed to environments ranging from densely populated cloud computing clusters to home desktop computers. Security rese...
Jiang Wang, Angelos Stavrou, Anup K. Ghosh