Virtual Computer

Results: 8252



#Item
91Software / Computing / Computer architecture / Computing platforms / Monolithic kernels / Kernel / Linux kernel / Address space layout randomization / Linux / Android / User space

Anatomy of a Remote Kernel Exploit Dan Rosenberg Copyright © 2011 Virtual Security Research, LLC.

Add to Reading List

Source URL: vulnfactory.org

Language: English - Date: 2012-01-16 13:38:49
92Computing / Computer architecture / Parallel computing / United States Department of Energy national laboratories / Federally Funded Research and Development Centers / Argonne National Laboratory / Lemont /  Illinois / University of Chicago / IBM Mira / Simulation / Internal combustion engine / Blue Gene

Workshop for High-Performance ComputingEnabled Engine Simulations Hosted by The Virtual Engine Research Institute and Fuels Initiative (VERIFI) Dr. Sibendu Som

Add to Reading List

Source URL: blogs.anl.gov

Language: English - Date: 2015-05-07 08:32:14
93Computing / Software / Virtual reality / Computer architecture / Cloud clients / User interface techniques / Head-mounted displays / New media / Android / Smartphone

Virtual Reality for Everyone Table of content Entering new worlds 3 Durovis Dive - a first step into virtual reality 3

Add to Reading List

Source URL: www.durovis.com

Language: English - Date: 2015-03-12 15:02:33
94Computing / Fault-tolerant computer systems / Data synchronization / State machine replication / Replication / Network File System / Byzantine fault tolerance / Consensus / Ping / Transmission Control Protocol / Virtual synchrony / Data grid

Appears in the Proceedings of the Third Symposium on Operating Systems Design and Implementation, New Orleans, USA, FebruaryPractical Byzantine Fault Tolerance Miguel Castro and Barbara Liskov Laboratory for Compu

Add to Reading List

Source URL: www.cs.utah.edu

Language: English - Date: 2016-08-22 23:25:09
95Global illumination algorithms / Computer graphics / 3D computer graphics / Shading / Graphics / Imaging / Virtual reality / Ambient occlusion / Screen space ambient occlusion / Normal / SSAO / Deferred shading

SS_Bent_Cones_Klehm11.pdf

Add to Reading List

Source URL: people.mpi-inf.mpg.de

Language: English - Date: 2012-01-03 04:29:36
96Computer network security / Computing / Computer security / Cyberwarfare / Data security / Firewall / Network management / Managed security service / F5 Networks / Virtual security appliance

Managed Security Service – Basic Packageto be completed by customer) Dear 1-Net Customer, Please complete the attached document in its entirety and return directly your 1-Net Account Manager. ALL sectio

Add to Reading List

Source URL: 1-net.com.sg

Language: English - Date: 2015-12-30 21:08:34
97Education / Euthenics / Knowledge sharing / Educational psychology / Educational technology / Computer-supported collaborative learning / M-learning / Situated learning / Virtual learning environment / Collaborative learning / Learning theory / Learning environment

Microsoft Word - IJMLO80305_Ahmad & Pinkwart.doc

Add to Reading List

Source URL: cses.informatik.hu-berlin.de

Language: English - Date: 2015-08-04 08:47:57
98Humancomputer interaction / Computing / Software / User interface techniques / Computer animation / Tracking / Motion capture / Virtual reality / Kinect / Simulation / Augmented reality / Virtual camera system

Available online at www.sciencedirect.com ScienceDirect Procedia CIRP–000 www.elsevier.com/locate/procedia

Add to Reading List

Source URL: www.uni-ulm.de

Language: English - Date: 2016-07-06 05:07:10
99Computer network security / Computing / Internet privacy / Network architecture / Crypto-anarchism / Computer security / Computer architecture / Virtual private networks

How to get access to Processing Servers Projects inside DAPA DAPA offer two solutions for processing data related to ongoing projects.  

Add to Reading List

Source URL: dapa.ciat.cgiar.org

Language: English - Date: 2015-02-20 09:23:24
100Computer network security / Computing / Computer security / Cyberwarfare / Layer 2 Tunneling Protocol / Ethernet / DMZ / Virtual private network / Network switch / Firewall / Light-emitting diode

CyberGuard SG User Manual CyberGuard 7984 South Welby Park Drive #101 Salt Lake City, Utah 84084

Add to Reading List

Source URL: go.mcafee.com

Language: English - Date: 2006-01-11 00:17:53
UPDATE