Sciweavers

8493 search results - page 84 / 1699
» Implementing a distributed firewall
Sort
View
NSPW
2006
ACM
15 years 9 months ago
Googling considered harmful
Virtually every Internet user on the planet uses the powerful free tools offered by a handful of information service providers in many aspects of their personal and professional l...
Gregory J. Conti
ICCS
2005
Springer
15 years 8 months ago
Safety of a Server-Based Version Vector Protocol Implementing Session Guarantees
Session guarantees are used to manage replica consistency of a distributed system from the client perspective. This paper defines formally the guarantees, presents and proves safe...
Jerzy Brzezinski, Cezary Sobaniec, Dariusz Wawrzyn...
CLUSTER
2003
IEEE
15 years 8 months ago
Optimized Implementation of Extendible Hashing to Support Large File System Directory
Extendible hashing is a kind of fast indexing technology; it provides with a way of storing structural data records so that each of them can be gotten very quickly. In this paper,...
Rongfeng Tang, Dan Meng, Sining Wu
HPCA
1996
IEEE
15 years 7 months ago
A Comparison of Entry Consistency and Lazy Release Consistency Implementations
This paper compares several implementations of entry consistency (EC) and lazy release consistency (LRC), two relaxed memory models in use with software distributed shared memory ...
Sarita V. Adve, Alan L. Cox, Sandhya Dwarkadas, Ra...
HPDC
2005
IEEE
15 years 8 months ago
Design and implementation tradeoffs for wide-area resource discovery
This paper describes the design and implementation of SWORD, a scalable resource discovery service for widearea distributed systems. In contrast to previous systems, SWORD allows ...
David L. Oppenheimer, Jeannie R. Albrecht, David A...