Sciweavers

1320 search results - page 27 / 264
» Performance Comparison of Distributed Object Server Implemen...
Sort
View
KBSE
2005
IEEE
15 years 3 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
OSDI
1994
ACM
14 years 11 months ago
Opportunistic Log: Efficient Installation Reads in a Reliable Storage Server
In a distributed storage system, client caches managed on the basis of small granularity objects can provide better memory utilization then page-based caches. However, object serv...
James O'Toole, Liuba Shrira
COMCOM
2006
112views more  COMCOM 2006»
14 years 9 months ago
Dynamic server selection using fuzzy inference in content distribution networks
To accommodate the exponential growth of Web traffic, Content Distribution Networks (CDN) have been designed and deployed to distribute content to different cache servers, and to ...
Lin Cai, Jun Ye, Jianping Pan, Xuemin Shen, Jon W....
IPPS
2000
IEEE
15 years 2 months ago
Replicating the Contents of a WWW Multimedia Repository to Minimize Download Time
Dynamic replication algorithms aim at allocating, migrating and deleting copies of an object over various Internet hosts, according to the access patterns exhibited online, so as ...
Thanasis Loukopoulos, Ishfaq Ahmad
SIGCOMM
2010
ACM
14 years 9 months ago
DONAR: decentralized server selection for cloud services
Geo-replicated services need an effective way to direct client requests to a particular location, based on performance, load, and cost. This paper presents DONAR, a distributed sy...
Patrick Wendell, Joe Wenjie Jiang, Michael J. Free...