Sciweavers

1558 search results - page 158 / 312
» Scalable work stealing
Sort
View
CCGRID
2006
IEEE
15 years 5 months ago
Closing Cluster Attack Windows Through Server Redundancy and Rotations
— It is well-understood that increasing redundancy in a system generally improves the availability and dependability of the system. In server clusters, one important form of redu...
Yih Huang, David Arsenault, Arun Sood
ICDE
2006
IEEE
161views Database» more  ICDE 2006»
15 years 5 months ago
A Survey on Disk Oriented Querying and Reasoning on the Semantic Web
This paper presents a description of seven systems, which use database technology to both represent knowledge persistently and make scalable queries on it, in the Semantic Web con...
María del Mar Roldán García, ...
ACSAC
2005
IEEE
15 years 4 months ago
A Host-Based Approach to Network Attack Chaining Analysis
The typical means by which an attacker breaks into a network is through a chain of exploits, where each exploit in the chain lays the groundwork for subsequent exploits. Such a ch...
Paul Ammann, Joseph Pamula, Julie A. Street, Ronal...
CCGRID
2005
IEEE
15 years 4 months ago
OGSA-based grid workload monitoring
In heterogeneous and dynamic distributed systems like the Grid, detailed monitoring of workload and its resulting system performance (e.g. response time) is required to facilitate...
Rui Zhang, Steve Moyle, Steve McKeever, Stephen He...
ISCC
2005
IEEE
104views Communications» more  ISCC 2005»
15 years 4 months ago
Reducing the Forwarding State Requirements of Point-to-Multipoint Trees Using MPLS Multicast
IP multicast was first proposed to improve the performance of applications that require group communications. Still, many years after its initial proposal, IP multicast is not wi...
George Apostolopoulos, Ioana Ciurea