Sciweavers

1027 search results - page 52 / 206
» Opening Up The Enterprise
Sort
View
EUROPAR
2007
Springer
15 years 6 months ago
Virtual Cluster Management with Xen
Recently, virtualization of hardware resources to run multiple instances of independent virtual machines over physical hosts has gained popularity due to an industry-wide focus on ...
Nikhil Bhatia, Jeffrey S. Vetter
PAM
2007
Springer
15 years 6 months ago
Early Recognition of Encrypted Applications
Abstract. Most tools to recognize the application associated with network connections use well-known signatures as basis for their classification. This approach is very effective ...
Laurent Bernaille, Renata Teixeira
AICCSA
2006
IEEE
101views Hardware» more  AICCSA 2006»
15 years 5 months ago
Refactoring Tools and Complementary Techniques
Poorly designed software systems are difficult to understand and maintain. Modifying code in one place could lead to unwanted repercussions elsewhere due to high coupling. Adding ...
Martin Drozdz, Derrick G. Kourie, Bruce W. Watson,...
ETFA
2006
IEEE
15 years 5 months ago
Wake on LAN over Internet as Web Service
In this paper we present an approach based on the use of embedded network devices for the deployment of small network services, such as DHCP, BOOTP, filters or very specific proxi...
Juan Antonio Gil-Martínez-Abarca, Francisco...
ISCC
2006
IEEE
104views Communications» more  ISCC 2006»
15 years 5 months ago
Stable High-Capacity One-Hop Distributed Hash Tables
Most research on Distributed Hash Tables (DHTs) assumes ephemeral, lightly loaded deployments. Each node has a lifetime of a few hours and initiates a lookup once every few second...
John Risson, Aaron Harwood, Tim Moors