Sciweavers

13101 search results - page 2410 / 2621
» Design and implementation of an
Sort
View
HPDC
2000
IEEE
14 years 2 months ago
Performance Evaluation of a Firewall-Compliant Globus-based Wide-Area Cluster System
In this paper, we present a performance evaluation of a wide-area cluster system based on a rewallenabled Globus metacomputing toolkit. In order to establish communication links ...
Yoshio Tanaka, Motonori Hirano, Mitsuhisa Sato, Hi...
SP
2000
IEEE
134views Security Privacy» more  SP 2000»
14 years 2 months ago
Fang: A Firewall Analysis Engine
Today, even a moderately sized corporate intranet contains multiple firewalls and routers, which are all used to enforce various aspects of the global corporate security policy. ...
Alain J. Mayer, Avishai Wool, Elisha Ziskind
EDBT
2000
ACM
14 years 2 months ago
Persistent Client-Server Database Sessions
Database systems support recovery, providing high database availability. However, database applications may lose work because of a server failure. In particular, if a database serv...
Roger S. Barga, David B. Lomet, Thomas Baby, Sanja...
PEPM
1999
ACM
14 years 2 months ago
Certifying Compilation and Run-Time Code Generation
A certifying compiler takes a source language program and produces object code, as well as a certi cate" that can be used to verify that the object code satis es desirable pr...
Luke Hornof, Trevor Jim
SIGOPSE
1998
ACM
14 years 2 months ago
Distributed virtual machines: a system architecture for network computing
Modern virtual machines, such as Java and Inferno, are emerging as network computing s. While these virtual machines provide higher-level abstractions and more sophisticated servi...
Emin Gün Sirer, Robert Grimm, Brian N. Bersha...
« Prev « First page 2410 / 2621 Last » Next »