Sciweavers

2520 search results - page 53 / 504
» Application Awareness Makes Storage More Useful
Sort
View
IJHPCA
2006
80views more  IJHPCA 2006»
15 years 1 months ago
Interference-Aware Scheduling
Overlapping communication with computation is a well-known technique to increase application performance. While it is commonly assumed that communication and computation can be ov...
Barbara Kreaseck, Larry Carter, Henri Casanova, Je...
COMPUTER
2008
86views more  COMPUTER 2008»
15 years 2 months ago
SSL/TLS Session-Aware User Authentication
Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce applications, such as Internet banking. SSL/TLS session-aware user authentication can be used to ...
Rolf Oppliger, Ralf Hauser, David A. Basin
133
Voted
ICPPW
2009
IEEE
14 years 11 months ago
A Security-Aware Approach to JXTA-Overlay Primitives
The JXTA-Overlay project is an effort to use JXTA technology to provide a generic set of functionalities that can be used by developers to deploy P2P applications. Since its desig...
Joan Arnedo-Moreno, Keita Matsuo, Leonard Barolli,...
117
Voted
CCR
2004
91views more  CCR 2004»
15 years 1 months ago
New techniques for making transport protocols robust to corruption-based loss
Current congestion control algorithms treat packet loss as an indication of network congestion, under the assumption that most losses are caused by router queues overflowing. In r...
Wesley M. Eddy, Shawn Ostermann, Mark Allman
ASPLOS
1998
ACM
15 years 6 months ago
A Cost-Effective, High-Bandwidth Storage Architecture
This paper describes the Network-Attached Secure Disk (NASD) storage architecture, prototype implementations of NASD drives, array management for our architecture, and three files...
Garth A. Gibson, David Nagle, Khalil Amiri, Jeff B...