Sciweavers

9245 search results - page 1583 / 1849
» Virtualization
Sort
View
134
Voted
ISCAPDCS
2004
15 years 5 months ago
Detecting Grid-Abuse Attacks by Source-based Monitoring
While it provides the unprecedented processing power to solve many large scale computational problems, GRID, if abused, has the potential to easily be used to launch (for instance...
Jianjia Wu, Dan Cheng, Wei Zhao
ISCAPDCS
2004
15 years 5 months ago
Pushmepullyou: The Reality of Interaction with Shared Objects in Networked Walk-in Displays
This paper investigates the reality of shared manipulation of objects between users in distributed walkin displays and presents solutions to address the effects of constraints of ...
David J. Roberts, Oliver Otto, Robin Wolff
JVM
2004
106views Education» more  JVM 2004»
15 years 5 months ago
Kernel Plugins: When a VM Is Too Much
This paper presents kernel plugins, a framework for dynamic kernel specialization inspired by ideas borrowed from virtualization research. Plugins can be created and updated inexp...
Ivan B. Ganev, Greg Eisenhauer, Karsten Schwan
127
Voted
ECIS
2003
15 years 5 months ago
The duality of mobility: understanding fluid organizations and stable interaction
Debates concerning mobility are proliferating. Once looking at the issues of mobility, however, one can immediately find a vacuum within this emerging debate. The current mobility...
Daniele Pica, Masao Kakihara
NETWORKING
2004
15 years 5 months ago
LMPS: Localized Multi-path Selection for QoS Routing in VoIP Networks
Abstract. Localized QoS routing techniques were proposed to achieve acceptable performance without exchanging global state information over the network. In such techniques, the ing...
Khaled M. F. Elsayed, Hassan Fadel, Amin M. Nassar
« Prev « First page 1583 / 1849 Last » Next »