Sciweavers

1372 search results - page 106 / 275
» Implementing an ITIL-Based IT Service Management Measurement...
Sort
View
101
Voted
CEAS
2005
Springer
15 years 9 months ago
Accredited DomainKeys: A Service Architecture for Improved Email Validation
We present an architecture called Accredited DomainKeys, which builds on the DomainKeys email authentication infrastructure to address the following questions: • “Did the send...
Michael T. Goodrich, Roberto Tamassia, Danfeng Yao
123
Voted
EUROSYS
2009
ACM
15 years 10 months ago
SnowFlock: rapid virtual machine cloning for cloud computing
Virtual Machine (VM) fork is a new cloud computing abstraction that instantaneously clones a VM into multiple replicas running on different hosts. All replicas share the same init...
Horacio Andrés Lagar-Cavilla, Joseph Andrew...
116
Voted
ACSAC
1999
IEEE
15 years 8 months ago
Generic Support for PKIX Certificate Management in CDSA
The Common Data Security Architecture (CDSA) from the Open Group is a flexible standard that defines APIs for security services needed for implementing Public Key Infrastructure (...
Shabnam Erfani, C. Sekar Chandersekaran
133
Voted
USENIX
1990
15 years 4 months ago
Efficient User-Level File Cache Management on the Sun Vnode Interface
In developing a distributed file system, there are several good reasons for implementing the client file cache manager as a user-level process. These include ease of implementatio...
David C. Steere, James J. Kistler, Mahadev Satyana...
130
Voted
IJHPCA
2007
116views more  IJHPCA 2007»
15 years 3 months ago
Pricing for Utility-Driven Resource Management and Allocation in Clusters
Users perceive varying levels of utility for each different job completed by the cluster. Therefore, there is a need for existing cluster Resource Management Systems (RMS) to prov...
Chee Shin Yeo, Rajkumar Buyya