Sciweavers

469 search results - page 63 / 94
» A B2B Replication Service
Sort
View
MOBISYS
2005
ACM
15 years 9 months ago
Slingshot: deploying stateful services in wireless hotspots
Given a sufficiently good network connection, even a handheld computer can run extremely resource-intensive applications by executing the demanding portions on a remote server. At...
Ya-Yunn Su, Jason Flinn
ESCIENCE
2005
IEEE
15 years 3 months ago
Flexible IO Services in the Kepler Grid Workflow System
Existing Grid workflow tools assume that individual components either communicate by passing files from one application to another, or are explicitly linked using interprocess com...
David Abramson, Jagan Kommineni, Ilkay Altintas
ACSAC
1999
IEEE
15 years 2 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti
SOSP
2007
ACM
15 years 6 months ago
Attested append-only memory: making adversaries stick to their word
Researchers have made great strides in improving the fault tolerance of both centralized and replicated systems against arbitrary (Byzantine) faults. However, there are hard limit...
Byung-Gon Chun, Petros Maniatis, Scott Shenker, Jo...
PRDC
2005
IEEE
15 years 3 months ago
Optimal Choice of Checkpointing Interval for High Availability
Supporting high availability by checkpointing and switching to a backup upon failure of a primary has a cost. Trade-off studies help system architects to decide whether higher ava...
Diana Szentiványi, Simin Nadjm-Tehrani, Joh...