Sciweavers

177 search results - page 28 / 36
» A distributed middleware infrastructure for personalized ser...
Sort
View
97
Voted
WORM
2004
15 years 1 months ago
Toward understanding distributed blackhole placement
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
140
Voted
SAC
2000
ACM
15 years 4 months ago
The Mobile Agent Technology to Support and to Access Museum Information
The global scenario put together by communication networks determines new opportunities towards the realization of Internetbased distributed services in many complex and composite...
Paolo Bellavista, Antonio Corradi, Andrea Tomasi
127
Voted
CCGRID
2009
IEEE
15 years 4 months ago
Hierarchical Caches for Grid Workflows
From personal software to advanced systems, caching mechanisms have steadfastly been a ubiquitous means for reducing workloads. It is no surprise, then, that under the grid and clu...
David Chiu, Gagan Agrawal
CLUSTER
2003
IEEE
15 years 5 months ago
A General Self-Adaptive Task Scheduling System for Non-Dedicated Heterogeneous Computing
— The efforts to construct a national scale Grid computing environment have brought unprecedented computing capacity and complicacy. Exploiting this complex infrastructure requir...
Ming Wu, Xian-He Sun
SIGMETRICS
2012
ACM
257views Hardware» more  SIGMETRICS 2012»
13 years 2 months ago
Fair sampling across network flow measurements
Sampling is crucial for controlling resource consumption by internet traffic flow measurements. Routers use Packet Sampled NetFlow [9], and completed flow records are sampled in...
Nick G. Duffield