Sciweavers

2736 search results - page 398 / 548
» Implementable allocation rules
Sort
View
130
Voted
CCGRID
2011
IEEE
14 years 6 months ago
Autonomic SLA-Driven Provisioning for Cloud Applications
Abstract—Significant achievements have been made for automated allocation of cloud resources. However, the performance of applications may be poor in peak load periods, unless t...
Nicolas Bonvin, Thanasis G. Papaioannou, Karl Aber...
170
Voted
ICC
2011
IEEE
206views Communications» more  ICC 2011»
14 years 2 months ago
A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet
—Anonymity is one of the main motivations for conducting denial-of-service attacks. Currently, there is no mechanism to either identify the true source of an IP packet or to prov...
Marcelo D. D. Moreira, Rafael P. Laufer, Natalia C...
INFOCOM
2012
IEEE
13 years 5 months ago
Robust multi-pipeline scheduling in low-duty-cycle wireless sensor networks
—Data collection is one of the major traffic pattern in wireless sensor networks, which requires regular source nodes to send data packets to a common sink node with limited end...
Yongle Cao, Shuo Guo, Tian He
165
Voted
ISCA
2012
IEEE
248views Hardware» more  ISCA 2012»
13 years 5 months ago
Watchdog: Hardware for safe and secure manual memory management and full memory safety
Languages such as C and C++ use unsafe manual memory management, allowing simple bugs (i.e., accesses to an object after deallocation) to become the root cause of exploitable secu...
Santosh Nagarakatte, Milo M. K. Martin, Steve Zdan...
188
Voted
SIGMOD
2007
ACM
124views Database» more  SIGMOD 2007»
16 years 2 months ago
Query suspend and resume
Suppose a long-running analytical query is executing on a database server and has been allocated a large amount of physical memory. A high-priority task comes in and we need to ru...
Badrish Chandramouli, Christopher N. Bond, Shivnat...