Sciweavers

20745 search results - page 3957 / 4149
» Computer graphics for all
Sort
View
SIGMETRICS
2006
ACM
104views Hardware» more  SIGMETRICS 2006»
15 years 4 months ago
Modeling adoptability of secure BGP protocols
Despite the existence of several secure BGP routing protocols, there has been little progress to date on actual adoption. Although feasibility for widespread adoption remains the ...
Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zh...
SIGMETRICS
2006
ACM
174views Hardware» more  SIGMETRICS 2006»
15 years 4 months ago
Understanding the management of client perceived response time
Understanding and managing the response time of web services is of key importance as dependence on the World Wide Web continues to grow. We present Remote Latency-based Management...
David P. Olshefski, Jason Nieh
STOC
2006
ACM
121views Algorithms» more  STOC 2006»
15 years 4 months ago
On adequate performance measures for paging
Memory management is a fundamental problem in computer architecture and operating systems. We consider a two-level memory system with fast, but small cache and slow, but large mai...
Konstantinos Panagiotou, Alexander Souza
STORAGESS
2006
ACM
15 years 4 months ago
Using free web storage for data backup
Backing up important data is crucial. A variety of causes can lead to data loss, such as disk failures, administration errors, virus infiltration, theft, and physical damage to e...
Avishay Traeger, Nikolai Joukov, Josef Sipek, Erez...
VEE
2006
ACM
106views Virtualization» more  VEE 2006»
15 years 4 months ago
Using VMM-based sensors to monitor honeypots
Virtual Machine Monitors (VMMs) are a common tool for implementing honeypots. In this paper we examine the implementation of a VMM-based intrusion detection and monitoring system ...
Kurniadi Asrigo, Lionel Litty, David Lie
« Prev « First page 3957 / 4149 Last » Next »