Sciweavers

128 search results - page 24 / 26
» Monitoring and Reputation Mechanisms for Service Level Agree...
Sort
View
EUROSYS
2008
ACM
14 years 4 months ago
Protectit: trusted distributed services operating on sensitive data
Protecting shared sensitive information is a key requirement for today’s distributed applications. Our research uses virtualization technologies to create and maintain trusted d...
Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ah...
ICDE
2006
IEEE
201views Database» more  ICDE 2006»
14 years 1 months ago
Content and Context Aware Networking Using Semantic Tagging
Today’s model of networking primarily concentrates intelligence at the end hosts with the network itself offering a simple“best-effort”,“data agnostic” communication med...
Sethuram Balaji Kodeswaran, Anupam Joshi
VLSID
2001
IEEE
144views VLSI» more  VLSID 2001»
14 years 7 months ago
Next Generation Network Processors
Networking hardware manufacturers face the dual demands of supporting ever increasing bandwidth requirements, while also delivering new features, such as the ability to implement ...
Deepak Kataria
ICAC
2005
IEEE
14 years 29 days ago
Feedback-based Scheduling for Back-end Databases in Shared Dynamic Content Server Clusters
This paper introduces a self-configuring architecture for scaling the database tier of dynamic content web servers. We use a unified approach to load and fault management based ...
Gokul Soundararajan, Kaloian Manassiev, Jin Chen, ...
COMCOM
2008
145views more  COMCOM 2008»
13 years 7 months ago
A game-theoretic intrusion detection model for mobile ad hoc networks
In this paper, we address the problem of increasing the effectiveness of an intrusion detection system (IDS) for a cluster of nodes in ad hoc networks. To reduce the performance o...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...