Sciweavers

WSC
2001
13 years 6 months ago
A practical bottleneck detection method
This paper describes a novel method for detecting the bottleneck in a discrete event system by examining the average duration of a machine being active for all machines. The machi...
Christoph Roser, Masaru Nakano, Minoru Tanaka
JAC
2008
13 years 6 months ago
Sofic one head machines
There are several systems consisting in an object that moves on the plane by following a given rule. It is frequently observed that these systems eventually fall into an unexplaine...
Anahí Gajardo
NSDI
2008
13 years 7 months ago
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm
Botnets, i.e., networks of compromised machines under a common control infrastructure, are commonly controlled by an attacker with the help of a central server: all compromised ma...
Thorsten Holz, Moritz Steiner, Frederic Dahl, Erns...
SP
1998
IEEE
147views Security Privacy» more  SP 1998»
13 years 9 months ago
Secure Execution of Java Applets using a Remote Playground
Dahlia Malkhi, Michael K. Reiter, Aviel D. Rubin
ACSAC
2002
IEEE
13 years 10 months ago
Throttling Viruses: Restricting propagation to defeat malicious mobile code
Modern computer viruses spread incredibly quickly, far faster than human-mediated responses. This greatly increases the damage that they cause. This paper presents an approach to ...
Matthew M. Williamson
LCPC
2007
Springer
13 years 11 months ago
Supporting Huge Address Spaces in a Virtual Machine for Java on a Cluster
Abstract. To solve problems that require far more memory than a single machine can supply, data can be swapped to disk in some manner, it can be compressed, and/or the memory of mu...
Ronald Veldema, Michael Philippsen
HPCC
2007
Springer
13 years 11 months ago
Performance Prediction Based Resource Selection in Grid Environments
Deploying Grid technologies by distributing an application over several machines has been widely used for scientific simulations, which have large requirements for computational r...
Peggy Lindner, Edgar Gabriel, Michael M. Resch
IEEEPACT
2008
IEEE
13 years 11 months ago
A tuning framework for software-managed memory hierarchies
Achieving good performance on a modern machine with a multi-level memory hierarchy, and in particular on a machine with software-managed memories, requires precise tuning of progr...
Manman Ren, Ji Young Park, Mike Houston, Alex Aike...
SAGT
2009
Springer
136views Game Theory» more  SAGT 2009»
13 years 11 months ago
Non-clairvoyant Scheduling Games
In a scheduling game, each player owns a job and chooses a machine to execute it. While the social cost is the maximal load over all machines (makespan), the cost (disutility) of ...
Christoph Dürr, Nguyen Kim Thang
INFOCOM
2009
IEEE
13 years 11 months ago
Detecting Spam Zombies by Monitoring Outgoing Messages
—Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as DDoS, spamming, and identity theft. In t...
Zhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei...