Sciweavers

9245 search results - page 1544 / 1849
» Virtualization
Sort
View
ACNS
2004
Springer
131views Cryptology» more  ACNS 2004»
15 years 8 months ago
Evaluating Security of Voting Schemes in the Universal Composability Framework
In the literature, voting protocols are considered secure if they satisfy requirements such as privacy, accuracy, robustness, etc. It can be time consuming to evaluate a voting pr...
Jens Groth
ACSC
2004
IEEE
15 years 8 months ago
Exploiting FPGA Concurrency to Enhance JVM Performance
The Java Programming Language has been praised for its platform independence and portability, but because of its slow execution speed on a software Java Virtual Machine (JVM), som...
James Parnis, Gareth Lee
AINA
2004
IEEE
15 years 8 months ago
Wide-Area Real-Time Distributed Computing in a Tightly Managed Optical Grid - An Optiputer Vision
: Wide area network (WAN) -based distributed computing (DC) has become an active field of research, especially under the label of grid computing. On the other hand, research on WAN...
K. H. (Kane) Kim
AICCSA
2006
IEEE
102views Hardware» more  AICCSA 2006»
15 years 8 months ago
An Experimental and Industrial Experience: Avoiding Denial of Service via Memory Profiling
Poor memory management leads to memory leaks, which cause significant performance degradation and failure of software. If ignored, such leaks can potentially cause security breach...
Saeed Abu-Nimeh, Suku Nair, Marco F. Marchetti
AICT
2006
IEEE
123views Communications» more  AICT 2006»
15 years 8 months ago
Issues related to Development of Wireless Peer-to-Peer Games in J2ME
This paper describes and discusses challenges related to development of peer-to-peer games in J2ME using the available Bluetooth API (JSR82). By using Bluetooth on wireless device...
Alf Inge Wang, Michael Sars Norum, Carl-Henrik Wol...
« Prev « First page 1544 / 1849 Last » Next »