Sciweavers

480 search results - page 39 / 96
» Anonymous Transactions in Computer Networks
Sort
View
SAC
2010
ACM
13 years 9 months ago
TransPeer: adaptive distributed transaction monitoring for Web2.0 applications
In emerging Web2.0 applications such as virtual worlds or social networking websites, the number of users is very important (tens of thousands), hence the amount of data to manage...
Idrissa Sarr, Hubert Naacke, Stéphane Gan&c...
DEBS
2008
ACM
13 years 10 months ago
Speculative out-of-order event processing with software transaction memory
In event stream applications, events flow through a network of components that perform various types of operations, e.g., filtering, aggregation, transformation. When the operatio...
Andrey Brito, Christof Fetzer, Heiko Sturzrehm, Pa...
CCS
2006
ACM
14 years 13 days ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
SERP
2003
13 years 10 months ago
Memory Access Characteristics of Network Infrastructure Applications
Network infrastructure is composed of various devices located either in the core or at the edges of a wide-area network. These devices are required to deliver high transaction thr...
Abdul Waheed
ICAC
2007
IEEE
14 years 3 months ago
A Regression-Based Analytic Model for Dynamic Resource Provisioning of Multi-Tier Applications
— The multi-tier implementation has become the industry standard for developing scalable client-server enterprise applications. Since these applications are performance sensitive...
Qi Zhang, Ludmila Cherkasova, Evgenia Smirni