Sciweavers

4044 search results - page 571 / 809
» The Evolution of a Distributed Operating System
Sort
View
130
Voted
SRDS
1999
IEEE
15 years 7 months ago
An Adaptive Checkpointing Protocol to Bound Recovery Time with Message Logging
Numerous mathematical approaches have been proposed to determine the optimal checkpoint interval for minimizing total execution time of an application in the presence of failures....
Kuo-Feng Ssu, Bin Yao, W. Kent Fuchs
131
Voted
HOTOS
2009
IEEE
15 years 7 months ago
An End to the Middle
The last fifteen years has seen a vast proliferation of middleboxes to solve all manner of persistent limitations in the Internet protocol suite. Examples include firewalls, NATs,...
Colin Dixon, Arvind Krishnamurthy, Thomas E. Ander...
147
Voted
USENIX
2008
15 years 5 months ago
Free Factories: Unified Infrastructure for Data Intensive Web Services
We introduce the Free Factory, a platform for deploying data-intensive web services using small clusters of commodity hardware and free software. Independently administered virtua...
Alexander Wait Zaranek, Tom Clegg, Ward Vandewege,...
111
Voted
USS
2008
15 years 5 months ago
There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits
Phishing is a form of identity theft in which an attacker attempts to elicit confidential information from unsuspecting victims. While in the past there has been significant work ...
Marco Cova, Christopher Kruegel, Giovanni Vigna
119
Voted
USENIX
2003
15 years 5 months ago
A Cooperative Internet Backup Scheme
We present a novel peer-to-peer backup technique that allows computers connected to the Internet to back up their data cooperatively: Each computer has a set of partner computers,...
Mark Lillibridge, Sameh Elnikety, Andrew Birrell, ...