Sciweavers

85 search results - page 17 / 17
» Resource Management for Ad-Hoc Wireless Networks with Cluste...
Sort
View
IWIA
2005
IEEE
13 years 10 months ago
A General Cooperative Intrusion Detection Architecture for MANETs
1 Intrusion detection in MANETs is challenging because these networks change their topologies dynamically; lack concentration points where aggregated traffic can be analyzed; utili...
Daniel F. Sterne, Poornima Balasubramanyam, David ...
HPDC
2008
IEEE
13 years 11 months ago
Combining batch execution and leasing using virtual machines
As cluster computers are used for a wider range of applications, we encounter the need to deliver resources at particular times, to meet particular deadlines, and/or at the same t...
Borja Sotomayor, Kate Keahey, Ian T. Foster
GPC
2008
Springer
13 years 5 months ago
Middleware Integration and Deployment Strategies for Cyberinfrastructures
Virtual Organizations require infrastructure that meets their scientific needs. Traditionally, a VO can require access to computational backends that are suited for interactive app...
Sebastien Goasguen, Krishna Madhavan, David Wolins...
BTW
2009
Springer
132views Database» more  BTW 2009»
13 years 8 months ago
End-to-End Performance Monitoring of Databases in Distributed Environments
: This demonstration features the IBM DB2 Performance Expert for Linux, Unix and Windows, a high-end database monitoring tool that is capable of end-to-end monitoring in distribute...
Stefanie Scherzinger, H. Karn, T. Steinbach
COMGEO
2010
ACM
13 years 2 months ago
A new paradigm for integrated environmental monitoring
The vision of an integrated Earth observation system to help protect and sustain the planet and its inhabitants is significant and timely, and thus has been identified recently by...
Kevin Montgomery, Carsten W. Mundt