Sciweavers

1422 search results - page 241 / 285
» How to measure a large open-source distributed system
Sort
View
CIDR
2003
164views Algorithms» more  CIDR 2003»
15 years 1 months ago
Capacity Bound-free Web Warehouse
Web cache technologies have been developed as an extension of CPU cache, by modifying LRU (Least Recently Used) algorithms. Actually in web cache systems, we can use disks and ter...
Yahiko Kambayashi, Kai Cheng
SIGMOD
2007
ACM
197views Database» more  SIGMOD 2007»
15 years 12 months ago
Automated and on-demand provisioning of virtual machines for database applications
Utility computing delivers compute and storage resources to applications as an `on-demand utility', much like electricity, from a distributed collection of computing resource...
Piyush Shivam, Azbayar Demberel, Pradeep Gunda, Da...
CCS
2006
ACM
15 years 3 months ago
Design space and analysis of worm defense strategies
We give the first systematic investigation of the design space of worm defense system strategies. We accomplish this by g a taxonomy of defense strategies by abstracting away impl...
David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn...
ICC
2007
IEEE
186views Communications» more  ICC 2007»
15 years 6 months ago
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...
SIGMETRICS
2008
ACM
150views Hardware» more  SIGMETRICS 2008»
14 years 11 months ago
Performance of random medium access control, an asymptotic approach
Random Medium-Access-Control (MAC) algorithms have played an increasingly important role in the development of wired and wireless Local Area Networks (LANs) and yet the performanc...
Charles Bordenave, David McDonald, Alexandre Prout...