Sciweavers

3031 search results - page 371 / 607
» SNMS - Shadow Network Management System
Sort
View
CIKM
2005
Springer
15 years 10 months ago
Query workload-aware overlay construction using histograms
Peer-to-peer (p2p) systems offer an efficient means of data sharing among a dynamically changing set of a large number of autonomous nodes. Each node in a p2p system is connected...
Georgia Koloniari, Yannis Petrakis, Evaggelia Pito...
PVLDB
2008
137views more  PVLDB 2008»
15 years 3 months ago
EasyTicket: a ticket routing recommendation engine for enterprise problem resolution
Managing problem tickets is a key issue in the IT services industry. A large service provider may handle thousands of problem tickets from its customer on daily basis. The efficie...
Qihong Shao, Yi Chen, Shu Tao, Xifeng Yan, Nikos A...
CLOUDCOM
2010
Springer
15 years 2 months ago
A Comparison and Critique of Eucalyptus, OpenNebula and Nimbus
Eucalyptus, OpenNebula and Nimbus are three major open-source cloud-computing software platforms. The overall function of these systems is to manage the provisioning of virtual ma...
Peter Sempolinski, Douglas Thain
CIDR
2011
342views Algorithms» more  CIDR 2011»
14 years 8 months ago
Megastore: Providing Scalable, Highly Available Storage for Interactive Services
Megastore is a storage system developed to meet the requirements of today’s interactive online services. Megastore blends the scalability of a NoSQL datastore with the convenien...
Jason Baker, Chris Bond, James Corbett, J. J. Furm...
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
15 years 11 months ago
Methodology for Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Frederick T. Sheldon, Robert K. Abercrombie, Ali M...