Using a variable identity pipe for constrained delegation...
Using an index and count mechanism to coordinate access to a sha
Using local locks for global synchronization in multi-node...
Using local locks for global synchronization in multi-node...
Validating a data link before its access
Verification of image data
Verification of image data
Virtual communication channel and virtual private community,...
Virtual computing environment
Virtual computing environment
Virtual dial-up protocol for network communication
Virtual file servers with storage device
Virtual network element framework and operating system for...
Virtual private network system and method
Virtual token
Virtualizing network-attached-storage (NAS) with a compact...
Volume location service for a distributed file system
Web-based virtual computing machine
Weighted fair queuing scheduler
Wireless trusted point of access to a computer network