Sciweavers

2747 search results - page 6 / 550
» Network externalities in software systems
Sort
View
USENIX
2008
13 years 9 months ago
Bridging the Gap between Software and Hardware Techniques for I/O Virtualization
: The paravirtualized I/O driver domain model, used in Xen, provides several advantages including device driver isolation in a safe execution environment, support for guest VM tran...
Jose Renato Santos, Yoshio Turner, G. John Janakir...
ANCS
2010
ACM
13 years 5 months ago
sNICh: efficient last hop networking in the data center
: sNICh: Efficient Last Hop Networking in the Data Center Kaushik Kumar Ram, Jayaram Mudigonda, Alan L. Cox, Scott Rixner, Partha Ranganathan, Jose Renato Santos HP Laboratories H...
Kaushik Kumar Ram, Jayaram Mudigonda, Alan L. Cox,...
NOSSDAV
2010
Springer
14 years 7 days ago
Towards understanding the external links of video sharing sites: measurement and analysis
Recently, many video sharing sites provide external links so that their video or audio contents can be embedded into external web sites. For example, users can copy the embedded U...
Kunfeng Lai, Dan Wang
HICSS
2006
IEEE
143views Biometrics» more  HICSS 2006»
14 years 1 months ago
The Role of External Influences on Organizational Information Security Practices: An Institutional Perspective
This paper describes the initial findings of a case study intended to identify important organizational catalysts and impediments to implementing and using security technologies a...
Qing Hu, Paul Hart, Donna Cooke
CASCON
1996
113views Education» more  CASCON 1996»
13 years 8 months ago
Network management views using delegated agents
The lack of an appropriate external data model is one of the reasons for the dearth of eective network management applications. Many network management computations over Managemen...
Germán S. Goldszmidt