Sciweavers

3764 search results - page 44 / 753
» Design and Implementation of Performance Policies for SMS Sy...
Sort
View
ACSAC
2006
IEEE
14 years 2 months ago
From Languages to Systems: Understanding Practical Application Development in Security-typed Languages
Security-typed languages are an evolving tool for implementing systems with provable security guarantees. However, to date, these tools have only been used to build simple “toy...
Boniface Hicks, Kiyan Ahmadizadeh, Patrick Drew Mc...
POLICY
2004
Springer
14 years 2 months ago
Cassandra: Distributed Access Control Policies with Tunable Expressiveness
We study the specification of access control policy in large-scale distributed systems. Our work on real-world policies has shown that standard policy idioms such as role hierarc...
Moritz Y. Becker, Peter Sewell
SOSP
2007
ACM
14 years 5 months ago
VirtualPower: coordinated power management in virtualized enterprise systems
Power management has become increasingly necessary in large-scale datacenters to address costs and limitations in cooling or power delivery. This paper explores how to integrate p...
Ripal Nathuji, Karsten Schwan
BPM
2005
Springer
76views Business» more  BPM 2005»
14 years 2 months ago
The Price of Coordination in Resource Management
Abstract. We propose a resource management policy that grants or refuses requests for resources based only on the request made and the number of free resources. Computations at run...
Kees M. van Hee, Alexander Serebrenik, Natalia Sid...
WWW
2003
ACM
14 years 9 months ago
Design, implementation, and evaluation of a client characterization driven web server
In earlier work we proposed a way for a Web server to detect connectivity information about clients accessing it in order to take tailored actions for a client request. This paper...
Balachander Krishnamurthy, Yin Zhang, Craig E. Wil...