Sciweavers

1672 search results - page 249 / 335
» New directions in services management
Sort
View
ICETE
2004
204views Business» more  ICETE 2004»
15 years 1 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson
SPE
1998
129views more  SPE 1998»
14 years 11 months ago
Timing Trials, or the Trials of Timing: Experiments with Scripting and User-Interface Languages
This paper describes some basic experiments to see how fast various popular scripting and user-interface languages run on a spectrum of representative tasks. We found enormous var...
Brian W. Kernighan, Christopher J. Van Wyk
EUROSYS
2009
ACM
15 years 6 months ago
SnowFlock: rapid virtual machine cloning for cloud computing
Virtual Machine (VM) fork is a new cloud computing abstraction that instantaneously clones a VM into multiple replicas running on different hosts. All replicas share the same init...
Horacio Andrés Lagar-Cavilla, Joseph Andrew...
MICRO
2008
IEEE
149views Hardware» more  MICRO 2008»
15 years 6 months ago
Prefetch-Aware DRAM Controllers
Existing DRAM controllers employ rigid, non-adaptive scheduling and buffer management policies when servicing prefetch requests. Some controllers treat prefetch requests the same ...
Chang Joo Lee, Onur Mutlu, Veynu Narasiman, Yale N...
ICDCS
2005
IEEE
15 years 5 months ago
Flexible Consistency for Wide Area Peer Replication
The lack of a flexible consistency management solution hinders P2P implementation of applications involving updates, such as read-write file sharing, directory services, online ...
Sai Susarla, John B. Carter