Using local storage to handle multiple outstanding requests...
Using remote procedure calls to manage co-processor resources
Using resource item lists to consume resource items
Using semantic networks to develop a social network
Using the services of different devices via service objects
Using virtual networking devices to manage external connections
Utilizing captured IP packets to determine operations...
Validating change of name server
Validating software in a grid environment using ghost agents
Validation of domain name control
Variance-optimal sampling-based estimation of subset sums
Vector-based, clustering web geographic information system...
Verification of configuration information in BGP VPNs
Verification of service level agreement contracts in a...
Verification of the availability of a server
Verified computing environment for personal internet...
Verifying a lawful interception system
Verifying measurable aspects associated with a module
Verifying resource functionality before use by a grid job...
Verifying that a network management policy used by a...