Sciweavers

715 search results - page 121 / 143
» An Analysis of Performance Interference Effects in Virtual E...
Sort
View
ECBS
2007
IEEE
118views Hardware» more  ECBS 2007»
13 years 10 months ago
An Event-Driven Architecture for Fine Grained Intrusion Detection and Attack Aftermath Mitigation
In today’s computing environment, unauthorized accesses and misuse of critical data can be catastrophic to personal users, businesses, emergency services, and even national defe...
Jianfeng Peng, Chuan Feng, Haiyan Qiao, Jerzy W. R...
MANSCI
2010
76views more  MANSCI 2010»
13 years 7 months ago
Navel Gazing: Academic Inbreeding and Scientific Productivity
The practice of having PhDs employed by the university that trained them, commonly called "academic inbreeding," has long been assumed to have a damaging effect on schol...
Hugo Horta, Francisco M. Veloso, Rócio Gred...
WWW
2004
ACM
14 years 9 months ago
Remindin': semantic query routing in peer-to-peer networks based on social metaphors
In peer-to-peer networks, finding the appropriate answer for an information request, such as the answer to a query for RDF(S) data, depends on selecting the right peer in the netw...
Christoph Tempich, Steffen Staab, Adrian Wranik
CSE
2009
IEEE
14 years 3 months ago
A Network-Aware Distributed Membership Protocol for Collaborative Defense
— To counteract current trends in network malware, distributed solutions have been developed that harness the power of collaborative end-host sensors. While these systems greatly...
David Zage, Carl Livadas, Eve M. Schooler
CGO
2009
IEEE
14 years 3 months ago
Scenario Based Optimization: A Framework for Statically Enabling Online Optimizations
Abstract—Online optimization allows the continuous restructuring and adaptation of an executing application using live information about its execution environment. The further ad...
Jason Mars, Robert Hundt