Sciweavers

523 search results - page 86 / 105
» Configuration management for multi-agent systems
Sort
View
DIMVA
2009
14 years 10 months ago
A Service Dependency Modeling Framework for Policy-Based Response Enforcement
The use of dynamic access control policies for threat response adapts local response decisions to high level system constraints. However, security policies are often carefully tigh...
Nizar Kheir, Hervé Debar, Fréd&eacut...
96
Voted
OSDI
2008
ACM
15 years 9 months ago
Experiences with Content Addressable Storage and Virtual Disks
Efficiently managing storage is important for virtualized computing environments. Its importance is magnified by developments such as cloud computing which consolidate many thousa...
Anthony Liguori, Eric Van Hensbergen
140
Voted
OSDI
2008
ACM
15 years 9 months ago
SR-IOV Networking in Xen: Architecture, Design and Implementation
SR-IOV capable network devices offer the benefits of direct I/O throughput and reduced CPU utilization while greatly increasing the scalability and sharing capabilities of the devi...
Yaozu Dong, Zhao Yu, Greg Rose
EDBT
2008
ACM
130views Database» more  EDBT 2008»
15 years 9 months ago
Flexible Transaction Processing in the Argos Middleware
Transactional requirements, from new application domains and execution environments, are varying and may exceed traditional ACID properties. We believe that transactional middlewa...
Anna-Brith Arntsen, Marts Mortensen, Randi Karlsen...
67
Voted
DISCEX
2003
IEEE
15 years 2 months ago
DynaBone: Dynamic Defense Using Multi-layer Internet Overlays
1 Typically, individual DDOS solutions trade service level for security, resulting in overall decreased service performance. Further, each single DDOS solution presents a target fo...
Joseph D. Touch, Gregory G. Finn, Yu-Shun Wang, La...