Sciweavers

73 search results - page 14 / 15
» Characteristics of IT Outsourcing Contracts
Sort
View
CCS
2003
ACM
14 years 1 months ago
Using graphic turing tests to counter automated DDoS attacks against web servers
We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our approach exploits t...
William G. Morein, Angelos Stavrou, Debra L. Cook,...
DMKD
1997
ACM
198views Data Mining» more  DMKD 1997»
14 years 2 days ago
Clustering Based On Association Rule Hypergraphs
Clustering in data mining is a discovery process that groups a set of data such that the intracluster similarity is maximized and the intercluster similarity is minimized. These d...
Eui-Hong Han, George Karypis, Vipin Kumar, Bamshad...
WMRD
1990
13 years 12 months ago
Replication in Ficus Distributed File Systems
Ficus is a replicated general ling environment for Unix intended to scale to very large nationwide networks. The system employs an optimistic one copy availability" model in ...
Gerald J. Popek, Richard G. Guy, Thomas W. Page Jr...
SOSP
1997
ACM
13 years 9 months ago
Cashmere-2L: Software Coherent Shared Memory on a Clustered Remote-Write Network
Low-latency remote-write networks, such as DEC’s Memory Channel, provide the possibility of transparent, inexpensive, large-scale shared-memory parallel computing on clusters of...
Robert Stets, Sandhya Dwarkadas, Nikos Hardavellas...
WSC
2000
13 years 9 months ago
Developing a national allocation model for cadaveric kidneys
The UNOS Kidney Allocation Model (UKAM) is a software tool for the simulation and analysis of national cadaveric kidney and kidney-pancreas allocation policies for transplantation...
Sarah E. Taranto, Ann M. Harper, Erick B. Edwards,...