Sciweavers

2747 search results - page 212 / 550
» Network externalities in software systems
Sort
View
LCR
2000
Springer
172views System Software» more  LCR 2000»
15 years 7 months ago
Achieving Robust, Scalable Cluster I/O in Java
We present Tigris, a high-performance computation and I/O substrate for clusters of workstations that is implemented entirely in Java. Tigris automatically balances resource load a...
Matt Welsh, David E. Culler
MOBISYS
2008
ACM
15 years 5 months ago
Lightweight module isolation for sensor nodes
There is an increasing tendency in sensor networks (and related networked embedded systems) to push more complexity and `intelligence' into end-nodes. This in turn leads to a ...
Nirmal Weerasinghe, Geoff Coulson
160
Voted
ACMSE
2008
ACM
15 years 5 months ago
A distributed firewall and active response architecture providing preemptive protection
Firewalls provide very good network security features. However, classical perimeter firewall deployments suffer from limitations due to complex network topologies and the inabilit...
J. Lane Thames, Randal Abler, David Keeling
121
Voted
EUROMICRO
2004
IEEE
15 years 7 months ago
Intrusion Detection in Virtual Machine Environments
A virtual machine is a software replica of an underlying real machine. Multiple virtual machines can operate on the same host machine concurrently, without interfere each other. S...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
118
Voted
NSDI
2008
15 years 5 months ago
DieCast: Testing Distributed Systems with an Accurate Scale Model
Large-scale network services can consist of tens of thousands of machines running thousands of unique software configurations spread across hundreds of physical networks. Testing ...
Diwaker Gupta, Kashi Venkatesh Vishwanath, Amin Va...