Sciweavers

SIGOPSE
2004
ACM
13 years 10 months ago
Using time travel to diagnose computer problems
Andrew Whitaker, Richard S. Cox, Steven D. Gribble
SIGOPSE
2004
ACM
13 years 10 months ago
Using virtual markets to program global behavior in sensor networks
This paper presents market-based macroprogramming (MBM), a new paradigm for achieving globally efficient behavior in sensor networks. Rather than programming the individual, low-...
Geoffrey Mainland, Laura Kang, Sébastien La...
SIGOPSE
2004
ACM
13 years 10 months ago
An approach to benchmarking configuration complexity
Configuration is the process whereby components are assembled or adjusted to produce a functional system that operates at a specified level of performance. Today, the complexity o...
Aaron B. Brown, Joseph L. Hellerstein
SIGOPSE
2004
ACM
13 years 10 months ago
When physical is not real enough
This position paper argues that policies for physical memory management and for memory power mode control should be relocated to the system software of a programmable memory manag...
Frank Bellosa
SIGOPSE
2004
ACM
13 years 10 months ago
AP3: cooperative, decentralized anonymous communication
This paper describes a cooperative overlay network that provides anonymous communication services for participating users. The Anonymizing Peer-to-Peer Proxy (AP3) system provides...
Alan Mislove, Gaurav Oberoi, Ansley Post, Charles ...
SIGOPSE
2004
ACM
13 years 10 months ago
Energy-efficient cluster-based service discovery for Ubiquitous Computing
: Service discovery in Ubiquitous Computing is a task which has to be done frequently due to dynamically changing environments. The limited battery power of mobile devices requires...
Gregor Schiele, Christian Becker, Kurt Rothermel
SIGOPSE
2004
ACM
13 years 10 months ago
Exploiting semantic clustering in the eDonkey P2P network
Sidath B. Handurukande, Anne-Marie Kermarrec, Fabr...
SIGOPSE
2004
ACM
13 years 10 months ago
Trust but verify: accountability for network services
This paper promotes accountability as a central design goal for dependable networked systems. We define three properties for accountable systems that extend beyond the basic secu...
Aydan R. Yumerefendi, Jeffrey S. Chase
SIGOPSE
2004
ACM
13 years 10 months ago
Impeding attrition attacks in P2P systems
—P2P systems are exposed to an unusually broad range of attacks. These include a spectrum of denial-of-service, or attrition, attacks from low-level packet flooding to high-leve...
Petros Maniatis, Thomas J. Giuli, Mema Roussopoulo...
SIGOPSE
2004
ACM
13 years 10 months ago
Lessons and challenges in automating data dependability
Abstract: Designing and managing dependable systems is a difficult endeavor. In this paper, we describe challenges in this vast problem space, including provisioning and allocatin...
Kimberly Keeton, Dirk Beyer 0002, Jeffrey S. Chase...