Sciweavers

706 search results - page 127 / 142
» Clone-Aware Configuration Management
Sort
View
OSDI
2008
ACM
14 years 10 months ago
Live Migration of Direct-Access Devices
Virtual machine migration greatly aids management by allowing flexible provisioning of resources and decommissioning of hardware for maintenance. However, efforts to improve netwo...
Asim Kadav, Michael M. Swift
SIGMOD
2002
ACM
124views Database» more  SIGMOD 2002»
14 years 10 months ago
Middle-tier database caching for e-business
Scaling up to the enormous and growing Internet population with unpredictable usage patterns, Ecommerce applications face severe challenges in cost and manageability, especially f...
Qiong Luo, Sailesh Krishnamurthy, C. Mohan, Hamid ...
PODS
2007
ACM
104views Database» more  PODS 2007»
14 years 10 months ago
XML transformation by tree-walking transducers with invisible pebbles
The pebble tree automaton and the pebble tree transducer are enhanced by additionally allowing an unbounded number of `invisible' pebbles (as opposed to the usual `visible�...
Joost Engelfriet, Hendrik Jan Hoogeboom, Bart Samw...
EDBT
2008
ACM
130views Database» more  EDBT 2008»
14 years 10 months ago
Flexible Transaction Processing in the Argos Middleware
Transactional requirements, from new application domains and execution environments, are varying and may exceed traditional ACID properties. We believe that transactional middlewa...
Anna-Brith Arntsen, Marts Mortensen, Randi Karlsen...
ESORICS
2002
Springer
14 years 10 months ago
Outbound Authentication for Programmable Secure Coprocessors
A programmable secure coprocessor platform can help solve many security problems in distributed computing. However, these solutions usually require that coprocessor applications be...
Sean W. Smith