Sciweavers

4044 search results - page 637 / 809
» The Evolution of a Distributed Operating System
Sort
View
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
14 years 6 months ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis
124
Voted
COOPIS
2002
IEEE
15 years 8 months ago
Empirical Differences between COTS Middleware Scheduling Strategies
The proportion of complex distributed real-time embedded (DRE) systems made up of commercial-off-the-shelf (COTS) hardware and software is increasing significantly in response to...
Christopher D. Gill, Fred Kuhns, Douglas C. Schmid...
150
Voted
SOSP
2007
ACM
16 years 1 days ago
Attested append-only memory: making adversaries stick to their word
Researchers have made great strides in improving the fault tolerance of both centralized and replicated systems against arbitrary (Byzantine) faults. However, there are hard limit...
Byung-Gon Chun, Petros Maniatis, Scott Shenker, Jo...
127
Voted
HPDC
2007
IEEE
15 years 9 months ago
A statistical approach to risk mitigation in computational markets
We study stochastic models to mitigate the risk of poor Quality-of-Service (QoS) in computational markets. Consumers who purchase services expect both price and performance guaran...
Thomas Sandholm, Kevin Lai
126
Voted
WWW
2008
ACM
16 years 3 months ago
Understanding internet video sharing site workload: a view from data center design
In this paper we measured and analyzed the workload on Yahoo! Video, the 2nd largest U.S. video sharing site, to understand its nature and the impact on online video data center d...
Xiaozhu Kang, Hui Zhang 0002, Guofei Jiang, Haifen...