Sciweavers

1479 search results - page 135 / 296
» Management without (Detailed) Models
Sort
View
DSONLINE
2006
79views more  DSONLINE 2006»
13 years 10 months ago
Integrating Security Policies via Container Portable Interceptors
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Tom Ritter, Rudolf Schreiner, Ulrich Lang
NOMS
2010
IEEE
180views Communications» more  NOMS 2010»
13 years 8 months ago
Performance-driven task co-scheduling for MapReduce environments
—MapReduce is a data-driven programming model proposed by Google in 2004 which is especially well suited for distributed data analytics applications. We consider the management o...
Jorda Polo, David Carrera, Yolanda Becerra, Malgor...
GIS
2003
ACM
14 years 11 months ago
Nearest neighbor queries in road networks
With wireless communications and geo-positioning being widely available, it becomes possible to offer new e-services that provide mobile users with information about other mobile ...
Christian S. Jensen, Jan Kolárvr, Torben Ba...
GLOBECOM
2007
IEEE
14 years 4 months ago
Utilizing Semantic Tags for Policy Based Networking
Abstract— Policy based networks provide high levels of flexibility by allowing definition of packet handling rules within a network, resource allocation strategies, network man...
Sethuram Balaji Kodeswaran, Olga Ratsimor, Anupam ...
INFOCOM
2003
IEEE
14 years 3 months ago
Understanding CHOKe
— A recently proposed active queue management, CHOKe, is stateless, simple to implement, yet surprisingly effective in protecting TCP from UDP flows. As UDP rate increases, even...
Ao Tang, Jiantao Wang, Steven H. Low