Sciweavers

3104 search results - page 544 / 621
» Using quantitative analysis to implement autonomic IT system...
Sort
View
ICC
2008
IEEE
134views Communications» more  ICC 2008»
15 years 10 months ago
Secret Little Functions and Codebook for Protecting Users from Password Theft
—In this paper, we discuss how to prevent users’ passwords from being stolen by adversaries. We propose differentiated security mechanisms in which a user has the freedom to ch...
Yang Xiao, Chung-Chih Li, Ming Lei, Susan V. Vrbsk...
IEEEPACT
2008
IEEE
15 years 10 months ago
Multi-mode energy management for multi-tier server clusters
This paper presents an energy management policy for reconfigurable clusters running a multi-tier application, exploiting DVS together with multiple sleep states. We develop a the...
Tibor Horvath, Kevin Skadron
127
Voted
IPPS
2008
IEEE
15 years 10 months ago
Early experience with out-of-core applications on the Cray XMT
This paper describes our early experiences with a preproduction Cray XMT system that implements a scalable shared memory architecture with hardware support for multithreading. Unl...
Daniel G. Chavarría-Miranda, Andrès ...
153
Voted
ISSRE
2008
IEEE
15 years 10 months ago
Detection and Prediction of Resource-Exhaustion Vulnerabilities
Systems connected to the Internet are highly susceptible to denial-of-service attacks that can compromise service availability, causing damage to customers and providers. Due to e...
João Antunes, Nuno Ferreira Neves, Paulo Ve...
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
15 years 10 months ago
A Theoretical Perspective on Effective Interorganizational Knowledge
Interorganizational knowledge sharing is critical to knowledge intensive collaborations between organizations. Despite a proliferation of literature on knowledge sharing, most stu...
Nongkran Lertpittayapoom, Souren Paul, Peter P. My...