Sciweavers

641 search results - page 116 / 129
» Upright cluster services
Sort
View
IEEEARES
2010
IEEE
14 years 7 months ago
Using Smart Cards for Tamper-Proof Timestamps on Untrusted Clients
Online auctions of governmental bonds and CO2 certificates are challenged by high availability requirements in face of high peak loads around the auction deadline. Traditionally, t...
Guenther Starnberger, Lorenz Froihofer, Karl M. G&...
SIGMOD
2007
ACM
167views Database» more  SIGMOD 2007»
15 years 10 months ago
Data currency in replicated DHTs
Distributed Hash Tables (DHTs) provide a scalable solution for data sharing in P2P systems. To ensure high data availability, DHTs typically rely on data replication, yet without ...
Reza Akbarinia, Esther Pacitti, Patrick Valduriez
ICAC
2008
IEEE
15 years 4 months ago
Power and Performance Management of Virtualized Computing Environments Via Lookahead Control
— There is growing incentive to reduce the power consumed by large-scale data centers that host online services such as banking, retail commerce, and gaming. Virtualization is a ...
Dara Kusic, Jeffrey O. Kephart, James E. Hanson, N...
NOMS
2008
IEEE
15 years 4 months ago
Optimizing request denial and latency in an agent-based VPN architecture
—Agent-based virtual private networks architecture (ABVA) refers to the environment where a third-party provider runs and administers remote access VPN service for organizations ...
Haiyang Qian, Steve Dispensa, Deep Medhi
GRC
2007
IEEE
15 years 4 months ago
Towards Mobile Internet: Location Privacy Threats and Granular Computation Challenges
The bulk of contents out on the Internet continue to grow at an astounding pace. As computing and communications become ubiquitous, we are entering the Mobile Internet Computing e...
Ling Liu