Sciweavers

6584 search results - page 1162 / 1317
» Distributed Shared Contexts
Sort
View
154
Voted
KBSE
2005
IEEE
15 years 9 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
163
Voted
MM
2005
ACM
184views Multimedia» more  MM 2005»
15 years 9 months ago
A peer-to-peer network for live media streaming using a push-pull approach
In this paper, we present an unstructured peer-to-peer network called GridMedia for live media streaming employing a push-pull approach. Each node in GridMedia randomly selects it...
Meng Zhang, Jian-Guang Luo, Li Zhao, Shi-Qiang Yan...
150
Voted
PPOPP
2005
ACM
15 years 9 months ago
Exposing disk layout to compiler for reducing energy consumption of parallel disk based systems
Disk subsystem is known to be a major contributor to overall power consumption of high-end parallel systems. Past research proposed several architectural level techniques to reduc...
Seung Woo Son, Guangyu Chen, Mahmut T. Kandemir, A...
126
Voted
SIGMETRICS
2005
ACM
118views Hardware» more  SIGMETRICS 2005»
15 years 9 months ago
Nearly insensitive bounds on SMART scheduling
We define the class of SMART scheduling policies. These are policies that bias towards jobs with small remaining service times, jobs with small original sizes, or both, with the ...
Adam Wierman, Mor Harchol-Balter, Takayuki Osogami
VEE
2005
ACM
150views Virtualization» more  VEE 2005»
15 years 9 months ago
Diagnosing performance overheads in the xen virtual machine environment
Virtual Machine (VM) environments (e.g., VMware and Xen) are experiencing a resurgence of interest for diverse uses including server consolidation and shared hosting. An applicati...
Aravind Menon, Jose Renato Santos, Yoshio Turner, ...
« Prev « First page 1162 / 1317 Last » Next »