Sciweavers

21 search results - page 2 / 5
» Using the script MIB for policy-based configuration manageme...
Sort
View
DIMVA
2009
15 years 1 months ago
A Service Dependency Modeling Framework for Policy-Based Response Enforcement
The use of dynamic access control policies for threat response adapts local response decisions to high level system constraints. However, security policies are often carefully tigh...
Nizar Kheir, Hervé Debar, Fréd&eacut...
86
Voted
ISLPED
2004
ACM
99views Hardware» more  ISLPED 2004»
15 years 5 months ago
Dynamic power management for streaming data
—This paper presents a method that uses data buffers to create long periods of idleness to exploit power management. This method considers the power consumed by the buffers and a...
Nathaniel Pettis, Le Cai, Yung-Hsiang Lu
ICFP
2008
ACM
16 years 9 days ago
NixOS: a purely functional Linux distribution
Existing package and system configuration management tools suffer from an imperative model, where system administration actions such as upgrading packages or changes to system con...
Andres Löh, Eelco Dolstra
103
Voted
LISA
2004
15 years 1 months ago
Auto-configuration by File Construction: Configuration Management with newfig
A tool is described that provides for the automatic configuration of systems from a single description. The tool, newfig, uses two simple concepts to provide its functionality: bo...
William LeFebvre, David Snyder
89
Voted
SIGCOMM
2010
ACM
15 years 16 days ago
Energy proportionality of an enterprise network
Energy efficiency is becoming increasingly important in the operation of networking infrastructure, especially in enterprise and data center networks. While strategies for lowerin...
Priya Mahadevan, Sujata Banerjee, Puneet Sharma