Secret sharing algorithms have been used for intrusion tolerance, which ensure the confidentiality, integrity and availability of critical information. However, dynamically changi...
Abstract. Virtualization technology has become commonplace in modern data centers and cluster systems, often referred as “computing clouds”. In particular, the capability of vi...
William Voorsluys, James Broberg, Srikumar Venugop...
We present an algorithm for implementing byte-range locks using MPI passive-target one-sided communication. This algorithm is useful in any scenario in which multiple processes of ...
—In this paper we present an autonomic web services architecture that manages both the performance of service containers and the interconnection of those containers into a servic...
There is a growing need for systems that can monitor and analyze application performance data automatically in order to deliver reliable and sustained performance to applications....
Lingyun Yang, Jennifer M. Schopf, Catalin Dumitres...