Sciweavers

3031 search results - page 568 / 607
» SNMS - Shadow Network Management System
Sort
View
VEE
2012
ACM
322views Virtualization» more  VEE 2012»
13 years 10 months ago
Modeling virtualized applications using machine learning techniques
With the growing adoption of virtualized datacenters and cloud hosting services, the allocation and sizing of resources such as CPU, memory, and I/O bandwidth for virtual machines...
Sajib Kundu, Raju Rangaswami, Ajay Gulati, Ming Zh...
117
Voted
ICPADS
1998
IEEE
15 years 7 months ago
User-Defined Telecooperation Services
A user-defined telecooperation service (UTS) provides service elements for application-specific communication and cooperation processes as well as integrated means for the service...
Volker Gruhn, Peter Herrmann, Heiko Krumm
TPDS
2008
116views more  TPDS 2008»
15 years 3 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
EDCC
2008
Springer
15 years 5 months ago
A Distributed Approach to Autonomous Fault Treatment in Spread
This paper presents the design and implementation of the Distributed Autonomous Replication Management (DARM) framework built on top of the Spread group communication system. The ...
Hein Meling, Joakim L. Gilje
COMSUR
2008
169views more  COMSUR 2008»
15 years 3 months ago
Peer-to-peer-based resource discovery In global grids: A tutorial
Efficient Resource discovery mechanism is one of the fundamental requirement for Grid computing systems, as it aids in resource management and scheduling of applications. Resource...
Rajiv Ranjan, Aaron Harwood, Rajkumar Buyya