Sciweavers

5376 search results - page 18 / 1076
» Scalable Kernel Systems
Sort
View
WWW
2005
ACM
16 years 1 months ago
Data versioning techniques for internet transaction management
An Internet transaction is a transaction that involves communication over the Internet using standard Internet protocols such as HTTPS. Such transactions are widely used in Intern...
Ramkrishna Chatterjee, Gopalan Arun
HIPC
2005
Springer
15 years 6 months ago
The Impact of Noise on the Scaling of Collectives: A Theoretical Approach
The performance of parallel applications running on large clusters is known to degrade due to the interference of kernel and daemon activities on individual nodes, often referred t...
Saurabh Agarwal, Rahul Garg, Nisheeth K. Vishnoi
142
Voted
CIDR
2011
221views Algorithms» more  CIDR 2011»
14 years 4 months ago
Deuteronomy: Transaction Support for Cloud Data
The Deuteronomy system supports efficient and scalable ACID transactions in the cloud by decomposing functions of a database storage engine kernel into: (a) a transactional compon...
Justin J. Levandoski, David B. Lomet, Mohamed F. M...
ISCA
2005
IEEE
81views Hardware» more  ISCA 2005»
15 years 6 months ago
The Impact of Performance Asymmetry in Emerging Multicore Architectures
Performance asymmetry in multicore architectures arises when individual cores have different performance. Building such multicore processors is desirable because many simple cores...
Saisanthosh Balakrishnan, Ravi Rajwar, Michael Upt...
108
Voted
IEEEARES
2009
IEEE
15 years 7 months ago
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring
—Targeting the operating system kernel, the core of trust in a system, kernel rootkits are able to compromise the entire system, placing it under malicious control, while eluding...
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jian...