Sciweavers

1506 search results - page 145 / 302
» Application Deployment in Virtual Networks Using the X-Bone
Sort
View
257
Voted
HPDC
2012
IEEE
13 years 6 months ago
vSlicer: latency-aware virtual machine scheduling via differentiated-frequency CPU slicing
Recent advances in virtualization technologies have made it feasible to host multiple virtual machines (VMs) in the same physical host and even the same CPU core, with fair share ...
Cong Xu, Sahan Gamage, Pawan N. Rao, Ardalan Kanga...
142
Voted
OSDI
2000
ACM
15 years 5 months ago
Processes in KaffeOS: Isolation, Resource Management, and Sharing in Java
Single-language runtime systems, in the form of Java virtual machines, are widely deployed platforms for executing untrusted mobile code. These runtimes provide some of the featur...
Godmar Back, Wilson C. Hsieh, Jay Lepreau
134
Voted
CCS
2010
ACM
15 years 4 months ago
Securing wireless sensor networks against large-scale node capture attacks
Securing wireless sensor networks against node capture is a challenging task. All well-known random key pre-distribution systems, including the Eschenauer and Gligor's pionee...
Tuan Manh Vu, Reihaneh Safavi-Naini, Carey William...
146
Voted
CORR
2011
Springer
174views Education» more  CORR 2011»
14 years 10 months ago
Physical expander in Virtual Tree Overlay
Abstract. In this paper, we propose a new construction of constantdegree expanders motivated by their application in P2P overlay networks and in particular in the design of robust ...
Taisuke Izumi, Maria Potop-Butucaru, Mathieu Valer...
138
Voted
NETWORK
2006
116views more  NETWORK 2006»
15 years 3 months ago
Quality of service support in IEEE 802.16 networks
During the last few years, users all over the world have become more and more accustomed to the availability of broadband access. This has boosted the use of a wide variety both o...
Claudio Cicconetti, Luciano Lenzini, Enzo Mingozzi...