Sciweavers

569 search results - page 42 / 114
» Evaluating Cluster-based Network Servers
Sort
View
ADHOCNOW
2005
Springer
14 years 3 months ago
Cache Placement in Sensor Networks Under Update Cost Constraint
— In this paper, we address an optimization problem that arises in context of cache placement in sensor networks. In particular, we consider the cache placement problem where the...
Bin Tang, Samir R. Das, Himanshu Gupta
HPDC
2007
IEEE
14 years 4 months ago
Cooperative secondary authorization recycling
As distributed applications such as Grid and enterprise systems scale up and become increasingly complex, their authorization infrastructures—based predominantly on the request-...
Qiang Wei, Matei Ripeanu, Konstantin Beznosov
DSOM
2005
Springer
14 years 3 months ago
Utilization and SLO-Based Control for Dynamic Sizing of Resource Partitions
This paper deals with a shared server environment where the server is divided into a number of resource partitions and used to host multiple applications at the same time. In a cas...
Zhikui Wang, Xiaoyun Zhu, Sharad Singhal
HIP
2005
Springer
208views Cryptology» more  HIP 2005»
14 years 3 months ago
Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks
In this paper, we propose a new class of Human Interactive Proofs (HIPs) that allow a human to distinguish one computer from another. Unlike traditional HIPs, where the computer is...
Rachna Dhamija, J. D. Tygar
PDIS
1994
IEEE
14 years 2 months ago
Distributed Selective Dissemination of Information
To help users cope with information overload, Selective Dissemination of Information SDI will increasingly become an important tool in wide area information systems. In an SDI ser...
Tak W. Yan, Hector Garcia-Molina