Sciweavers

6775 search results - page 1255 / 1355
» Diagnosis of Active Systems
Sort
View
IUI
2010
ACM
14 years 5 months ago
DocuBrowse: faceted searching, browsing, and recommendations in an enterprise context
Browsing and searching for documents in large, online enterprise document repositories are common activities. While internet search produces satisfying results for most user queri...
Andreas Girgensohn, Frank M. Shipman III, Francine...
WOSP
2010
ACM
14 years 5 months ago
Agile resource management in a virtualized data center
In this paper we develop, implement and evaluate an approach to quickly reassign resources for a virtualized utility computing platform. The approach provides this platform agilit...
Wei Zhang, Hangwei Qian, Craig E. Wills, Michael R...
HICSS
2009
IEEE
96views Biometrics» more  HICSS 2009»
14 years 5 months ago
The Potential of Renewable Energy to Reduce the Dependence of the State of Hawaii on Oil
Deriving nearly 90% of its primary energy resources from oil, the State of Hawaii is more dependent on oil than any other U.S. state. The price of electricity in Hawaii is also mo...
Doug Arent, John Barnett, Gail Mosey, Alison Wise
VEE
2009
ACM
172views Virtualization» more  VEE 2009»
14 years 5 months ago
Entropy: a consolidation manager for clusters
Clusters provide powerful computing environments, but in practice much of this power goes to waste, due to the static allocation of tasks to nodes, regardless of their changing co...
Fabien Hermenier, Xavier Lorca, Jean-Marc Menaud, ...
CCS
2009
ACM
14 years 5 months ago
Countering kernel rootkits with lightweight hook protection
Kernel rootkits have posed serious security threats due to their stealthy manner. To hide their presence and activities, many rootkits hijack control flows by modifying control d...
Zhi Wang, Xuxian Jiang, Weidong Cui, Peng Ning
« Prev « First page 1255 / 1355 Last » Next »