Buscar
Mostrando ítems 1-10 de 1443
Sharing Reputation Across Virtual Communities
(Universidad de Talca, 2010)
A Management Tool for the Replication of Operating Systems in Wireless Communication Networks
(IEEE Computer Soc, 2011-01-01)
To simplify computer management, various administration systems based on wired connections adopt advanced techniques to manage software configuration. Nevertheless, the strong relation between hardware and software makes ...
A Management Tool for the Replication of Operating Systems in Wireless Communication Networks
(IEEE Computer Soc, 2011-01-01)
To simplify computer management, various administration systems based on wired connections adopt advanced techniques to manage software configuration. Nevertheless, the strong relation between hardware and software makes ...
A Management Tool for the Replication of Operating Systems in Wireless Communication Networks
(IEEE Computer Soc, 2014)
Uma avaliação experimental do uso de desktops virtuais
(Universidade Federal de São CarlosBRUFSCarPrograma de Pós-Graduação em Ciência da Computação - PPGCC, 2014-02-25)
A server cluster connected to the Internet can support virtual desktops in a virtual computing environment. Each user can have his/her own virtual desktop, accessed through the Internet by means of devices such as laptop, ...
Infraestructura móvil virtual VMI con gestión centralizada adaptada a tecnologías WEARABL: Estudio de factibilidad técnica.
(Universidad Santo TomásPregrado Ingeniería ElectrónicaFacultad de Ingeniería Electrónica, 2017-03-01)
In this work we seek to give a concept of virtualization feasibility
of a cell phone applying the concept of virtual mobile infrastructure VMI (virtual
mobile infrastructure) with management through a wearable or “wearable” ...
Security Threats in Volunteer Computing Environments Using the Berkeley Open Infrastructure for Network Computing (BOINC)
(2012-06-01)
Volunteer Computing is a low cost and easy deployable solution for scientific projects that require large amounts of computational power. Volunteer computing public access capabilities comes with several security threats ...