Sciweavers

342 search results - page 60 / 69
» A planning based approach to failure recovery in distributed...
Sort
View
22
Voted
ECBS
2009
IEEE
119views Hardware» more  ECBS 2009»
14 years 2 months ago
Software Architectural Design Meets Security Engineering
Security requirements strongly influence the architectural design of complex IT systems in a similar way as other non-functional requirements. Both security engineering as well a...
Stephan Bode, Anja Fischer, Winfried E. Kühnh...
SIGOPS
2010
163views more  SIGOPS 2010»
13 years 2 months ago
Automated control of internet services
Finding an efficient configuration for cluster-based multi-tier Internet services is often a difficult task. Moreover, even a good configuration could become obsolete, depending o...
Jean Arnaud
CCS
2001
ACM
14 years 1 days ago
Protecting Software Code by Guards
Abstract. Protection of software code against illegitimate modifications by its users is a pressing issue to many software developers. Many software-based mechanisms for protectin...
Hoi Chang, Mikhail J. Atallah
ICAC
2006
IEEE
14 years 1 months ago
Weatherman: Automated, Online and Predictive Thermal Mapping and Management for Data Centers
— Recent advances have demonstrated the potential benefits of coordinated management of thermal load in data centers, including reduced cooling costs and improved resistance to ...
Justin D. Moore, Jeffrey S. Chase, Parthasarathy R...
CN
2008
100views more  CN 2008»
13 years 7 months ago
Building resilient low-diameter peer-to-peer topologies
As more applications rely on underlying peer-to-peer topologies, the need for efficient and resilient infrastructure has become more pressing. A number of important classes of top...
Rita H. Wouhaybi, Andrew T. Campbell