Sciweavers

277 search results - page 14 / 56
» Virtualization Techniques in Network Emulation Systems
Sort
View
EUROMICRO
2004
IEEE
15 years 3 months ago
Intrusion Detection in Virtual Machine Environments
A virtual machine is a software replica of an underlying real machine. Multiple virtual machines can operate on the same host machine concurrently, without interfere each other. S...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
IM
1997
15 years 1 months ago
Customer Management and Control of Broadband VPN Services
We present an architecture for customer management and control of a broadband VPN service. The architecture is aimed at giving the VPN customer a high level of control over the tr...
Mun Choon Chan, Aurel A. Lazar, Rolf Stadler
SI3D
2012
ACM
13 years 7 months ago
Tabletop Ensemble: touch-enabled virtual percussion instruments
We present an interactive virtual percussion instrument system, Tabletop Ensemble, that can be used by a group of collaborative users simultaneously to emulate playing music in re...
Zhimin Ren, Ravish Mehra, Jason Coposky, Ming C. L...
VR
2009
IEEE
188views Virtual Reality» more  VR 2009»
15 years 6 months ago
Crafting Personalized Facial Avatars Using Editable Portrait and Photograph Example
Computer-generated facial avatars have been increasingly used in a variety of virtual reality applications. Emulating the real-world face sculpting process, we present an interact...
Tanasai Sucontphunt, Zhigang Deng, Ulrich Neumann
ANCS
2010
ACM
14 years 9 months ago
sNICh: efficient last hop networking in the data center
: sNICh: Efficient Last Hop Networking in the Data Center Kaushik Kumar Ram, Jayaram Mudigonda, Alan L. Cox, Scott Rixner, Partha Ranganathan, Jose Renato Santos HP Laboratories H...
Kaushik Kumar Ram, Jayaram Mudigonda, Alan L. Cox,...