Sciweavers

9245 search results - page 1558 / 1849
» Virtualization
Sort
View
MOBISYS
2008
ACM
15 years 6 months ago
Transient customization of mobile computing infrastructure
Kimberley enables rapid software provisioning of fixed infrastructure for transient use by a mobile device. It uses virtual machine (VM) technology, but avoids the performance cha...
Adam Wolbach, Jan Harkes, Srinivas Chellappa, Maha...
WSC
2007
15 years 6 months ago
The simulation power of automod
Decision making in industry continues to become more complicated. Customers are more demanding, competition is more fierce, and costs for labor and raw materials continue to rise....
Todd LeBaron, Craig Jacobsen
USS
2008
15 years 6 months ago
Towards Application Security on Untrusted Operating Systems
Complexity in commodity operating systems makes compromises inevitable. Consequently, a great deal of work has examined how to protect security-critical portions of applications f...
Dan R. K. Ports, Tal Garfinkel
USS
2008
15 years 6 months ago
V-NetLab: An Approach for Realizing Logically Isolated Networks for Security Experiments
Cyber security experiments with potentially malicious software can possibly damage the testbed environment and "escape" into the Internet. Due to this security concern, ...
Weiqing Sun, Varun Katta, Kumar Krishna, R. Sekar
WSC
2008
15 years 6 months ago
Simulation and visualization of traffic operations in Augmented Reality for improved planning and design of road construction pr
This paper describes research that investigated the application of 3D Augmented Reality (AR) for animating traffic simulation models in real time to support the planning and desig...
Amir H. Behzadan, Vineet R. Kamat
« Prev « First page 1558 / 1849 Last » Next »