Sciweavers

802 search results - page 118 / 161
» Security Policy Reconciliation in Distributed Computing Envi...
Sort
View
ICPP
2008
IEEE
15 years 8 months ago
Overcoming Scalability Challenges for Tool Daemon Launching
: Many tools that target parallel and distributed environments must co-locate a set of daemons with the distributed processes of the target application. However, efficient and por...
Dong H. Ahn, Dorian C. Arnold, Bronis R. de Supins...
SIGCOMM
2009
ACM
15 years 8 months ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...
ICIW
2009
IEEE
15 years 8 months ago
Paircoding: Improving File Sharing Using Sparse Network Codes
BitTorrent and Practical Network Coding are efficient methods for sharing files in a peer-to-peer network. Both face the problem to distribute a given file using peers with dif...
Christian Ortolf, Christian Schindelhauer, Arne Va...
CLUSTER
2007
IEEE
15 years 8 months ago
Scheduling malleable applications in multicluster systems
— In large-scale distributed execution environments such as multicluster systems and grids, resource availability may vary due to resource failures and because resources may be a...
Jeremy Buisson, Omer Ozan Sonmez, Hashim H. Mohame...
117
Voted
CCGRID
2010
IEEE
15 years 2 months ago
Elastic Site: Using Clouds to Elastically Extend Site Resources
Infrastructure-as-a-Service (IaaS) cloud computing offers new possibilities to scientific communities. One of the most significant is the ability to elastically provision and relin...
Paul Marshall, Kate Keahey, Timothy Freeman