Boursas, L. (2009). Trust-based access control in feder-
ated environments. PhD thesis, PhD thesis, Technis-
che Universit
¨
at in M
¨
unchen.
Chakraborty, S. and Ray, I. (2006). Trustbac: integrating
trust relationships into the rbac model for access con-
trol in open systems. In Proceedings of the eleventh
ACM symposium on Access control models and tech-
nologies, pages 49–58. ACM.
Chen, P. M. and Noble, B. D. (2001). When virtual is better
than real [operating system relocation to virtual ma-
chines]. In Hot Topics in Operating Systems, 2001.
Proceedings of the Eighth Workshop on, pages 133–
138. IEEE.
Christian Willems, Johannes Jasper, C. M. (2013). Intro-
ducing hands-on experience to a massive open on-
line course on openhpi. In Proceedings of IEEE In-
ternational Conference on Teaching, Assessment and
Learning for Engineering (TALE 2013), Kuta, Bali,
Indonesia. IEEE Press.
Dalton, C. I., Plaquin, D., Weidner, W., Kuhlmann, D.,
Balacheff, B., and Brown, R. (2009). Trusted virtual
platforms: a key enabler for converged client devices.
SIGOPS Oper. Syst. Rev., 43(1):36–43.
Dimmock, N., Belokosztolszki, A., Eyers, D., Bacon, J.,
and Moody, K. (2004). Using trust and risk in role-
based access control policies. In Proceedings of the
ninth ACM symposium on Access control models and
technologies, pages 156–162.
Dowty, M. and Sugerman, J. (2009). Gpu virtualization on
vmware’s hosted i/o architecture. SIGOPS Oper. Syst.
Rev., 43(3):73–82.
Feinbube, F., Rabe, B., L
¨
owis, M., and Polze, A. (2010).
NQueens on CUDA: Optimization Issues. In 2010
Ninth International Symposium on Parallel and Dis-
tributed Computing, pages 63–70, Washington, DC,
USA. IEEE Computer Society.
Garfinkel, T., Rosenblum, M., et al. (2003). A virtual
machine introspection based architecture for intrusion
detection. In NDSS.
Gr
¨
unewald, F., Meinel, C., Totschnig, M., and Willems, C.
(2013). Designing moocs for the support of multiple
learning styles. In Scaling up Learning for Sustained
Impact, pages 371–382. Springer.
Josang, A., Ismail, R., and Boyd, C. (2007). A survey of
trust and reputation systems for online service provi-
sion. Decision Support Systems, 43(2):618–644.
Kirk, D. and mei Hwu, W. (2010). Programming Massively
Parallel Processors: A Hands-on Approach. Morgan
Kaufmann, 1 edition.
Kolb, D. A. et al. (1984). Experiential learning: Experience
as the source of learning and development, volume 1.
Prentice-Hall Englewood Cliffs, NJ.
NVIDIA Corporation (2012). NVIDIA’s Next Generation
CUDA Compute Architecture Kepler GK110.
Pfoh, J., Schneider, C., and Eckert, C. (2009). A formal
model for virtual machine introspection. In Proceed-
ings of the 1st ACM workshop on Virtual machine se-
curity, pages 1–10. ACM.
Ravi, V. T., Becchi, M., Agrawal, G., and Chakradhar, S.
(2011). Supporting gpu sharing in cloud environments
with a transparent runtime consolidation framework.
In Proceedings of the 20th international symposium
on High performance distributed computing, HPDC
’11, pages 217–228, New York, NY, USA. ACM.
Singh, R., Gulwani, S., and Solar-Lezama, A. (2013). Auto-
mated feedback generation for introductory program-
ming assignments. In Proceedings of the 34th ACM
SIGPLAN conference on Programming language de-
sign and implementation, PLDI ’13, pages 15–26,
New York, NY, USA. ACM.
Tran, H., Hitchens, M., Varadharajan, V., and Watters, P.
(2005). A trust based access control framework for
p2p file-sharing systems. In System Sciences, 2005.
HICSS’05. Proceedings of the 38th Annual Hawaii In-
ternational Conference on, pages 302c–302c. IEEE.
Tr
¨
oger, P., Rasche, A., Feinbube, F., and Wierschke, R.
(2008). SOA Meets Robots - A Service-Based Soft-
ware Infrastructure for Remote Laboratories. Interna-
tional Journal of Online Engineering (iJOE), 4.