Sciweavers

9245 search results - page 1613 / 1849
» Virtualization
Sort
View
FUIN
2006
77views more  FUIN 2006»
15 years 3 months ago
The Impact of seq on Free Theorems-Based Program Transformations
Parametric polymorphism constrains the behavior of pure functional programs in a way that allows the derivation of interesting theorems about them solely from their types, i.e., vi...
Patricia Johann, Janis Voigtländer
IJNSEC
2008
150views more  IJNSEC 2008»
15 years 3 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald
IJNSEC
2008
72views more  IJNSEC 2008»
15 years 3 months ago
Bandwidth-Conserving Multicast VoIP Teleconference System
Teleconferencing is an essential feature in any business telephone system. A teleconference allows associates to engage in a group discussion by conducting a virtual meeting while...
Teck-Kuen Chua, David C. Pheanis
141
Voted
GRID
2006
Springer
15 years 3 months ago
Cacheable Decentralized Groups for Grid Resource Access Control
Abstract-- Sharing data among collaborators in widely distributed systems remains a challenge due to limitations with existing methods for defining groups across administrative dom...
Jeffrey Hemmes, Douglas Thain
CG
2007
Springer
15 years 3 months ago
Graphtracker: A topology projection invariant optical tracker
In this paper, we describe a new optical tracking algorithm for pose estimation of interaction devices in virtual and augmented reality. Given a 3D model of the interaction device...
Ferdi A. Smit, Arjen van Rhijn, Robert van Liere
« Prev « First page 1613 / 1849 Last » Next »