Sciweavers

8772 search results - page 1637 / 1755
» Business Services Networks
Sort
View
OSDI
2004
ACM
14 years 10 months ago
Boxwood: Abstractions as the Foundation for Storage Infrastructure
Abstractions as the Foundation for Storage Infrastructure John MacCormick, Nick Murphy, Marc Najork, Chandramohan A. Thekkath, and Lidong Zhou Microsoft Research Silicon Valley Wr...
John MacCormick, Nick Murphy, Marc Najork, Chandra...
WISE
2009
Springer
14 years 7 months ago
Maximizing Utility for Content Delivery Clouds
A content delivery cloud, such as MetaCDN1 , is an integrated overlay that utilizes cloud computing to provide content delivery services to Internet end-users. While it ensures sat...
Al-Mukaddim Khan Pathan, James Broberg, Rajkumar B...
ICDCS
2009
IEEE
14 years 7 months ago
The Taming of the Shrew: Mitigating Low-Rate TCP-Targeted Attack
A Shrew attack, which uses a low-rate burst carefully designed to exploit TCP’s retransmission timeout mechanism, can throttle the bandwidth of a TCP flow in a stealthy manner....
Chia-Wei Chang, Seungjoon Lee, B. Lin, Jia Wang
ICDCS
2009
IEEE
14 years 7 months ago
Distributed Processing of Spatial Alarms: A Safe Region-Based Approach
Spatial alarms are considered as one of the basic capabilities in future mobile computing systems for enabling personalization of location-based services. In this paper, we propos...
Bhuvan Bamba, Ling Liu, Arun Iyengar, Philip S. Yu
ICCD
2004
IEEE
97views Hardware» more  ICCD 2004»
14 years 7 months ago
Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution
1 Many computer security threats involve execution of unauthorized foreign code on the victim computer. Viruses, network and email worms, Trojan horses, backdoor programs used in ...
A. Murat Fiskiran, Ruby B. Lee
« Prev « First page 1637 / 1755 Last » Next »