Sciweavers

523 search results - page 86 / 105
» Configuration management for multi-agent systems
Sort
View
DIMVA
2009
14 years 9 hour ago
A Service Dependency Modeling Framework for Policy-Based Response Enforcement
The use of dynamic access control policies for threat response adapts local response decisions to high level system constraints. However, security policies are often carefully tigh...
Nizar Kheir, Hervé Debar, Fréd&eacut...
OSDI
2008
ACM
14 years 11 months ago
Experiences with Content Addressable Storage and Virtual Disks
Efficiently managing storage is important for virtualized computing environments. Its importance is magnified by developments such as cloud computing which consolidate many thousa...
Anthony Liguori, Eric Van Hensbergen
OSDI
2008
ACM
14 years 11 months ago
SR-IOV Networking in Xen: Architecture, Design and Implementation
SR-IOV capable network devices offer the benefits of direct I/O throughput and reduced CPU utilization while greatly increasing the scalability and sharing capabilities of the devi...
Yaozu Dong, Zhao Yu, Greg Rose
EDBT
2008
ACM
130views Database» more  EDBT 2008»
14 years 11 months ago
Flexible Transaction Processing in the Argos Middleware
Transactional requirements, from new application domains and execution environments, are varying and may exceed traditional ACID properties. We believe that transactional middlewa...
Anna-Brith Arntsen, Marts Mortensen, Randi Karlsen...
DISCEX
2003
IEEE
14 years 4 months ago
DynaBone: Dynamic Defense Using Multi-layer Internet Overlays
1 Typically, individual DDOS solutions trade service level for security, resulting in overall decreased service performance. Further, each single DDOS solution presents a target fo...
Joseph D. Touch, Gregory G. Finn, Yu-Shun Wang, La...