Sciweavers

706 search results - page 127 / 142
» Clone-Aware Configuration Management
Sort
View
OSDI
2008
ACM
16 years 3 months ago
Live Migration of Direct-Access Devices
Virtual machine migration greatly aids management by allowing flexible provisioning of resources and decommissioning of hardware for maintenance. However, efforts to improve netwo...
Asim Kadav, Michael M. Swift
SIGMOD
2002
ACM
124views Database» more  SIGMOD 2002»
16 years 3 months ago
Middle-tier database caching for e-business
Scaling up to the enormous and growing Internet population with unpredictable usage patterns, Ecommerce applications face severe challenges in cost and manageability, especially f...
Qiong Luo, Sailesh Krishnamurthy, C. Mohan, Hamid ...
121
Voted
PODS
2007
ACM
104views Database» more  PODS 2007»
16 years 3 months ago
XML transformation by tree-walking transducers with invisible pebbles
The pebble tree automaton and the pebble tree transducer are enhanced by additionally allowing an unbounded number of `invisible' pebbles (as opposed to the usual `visible�...
Joost Engelfriet, Hendrik Jan Hoogeboom, Bart Samw...
137
Voted
EDBT
2008
ACM
130views Database» more  EDBT 2008»
16 years 3 months ago
Flexible Transaction Processing in the Argos Middleware
Transactional requirements, from new application domains and execution environments, are varying and may exceed traditional ACID properties. We believe that transactional middlewa...
Anna-Brith Arntsen, Marts Mortensen, Randi Karlsen...
104
Voted
ESORICS
2002
Springer
16 years 2 months ago
Outbound Authentication for Programmable Secure Coprocessors
A programmable secure coprocessor platform can help solve many security problems in distributed computing. However, these solutions usually require that coprocessor applications be...
Sean W. Smith