Sciweavers

449 search results - page 55 / 90
» Protecting the Hosted Application Server
Sort
View
IMC
2004
ACM
14 years 1 months ago
Robust synchronization of software clocks across the internet
Accurate, reliable timestamping which is also convenient and inexpensive is needed in many important areas including real-time network applications and network measurement. Recent...
Darryl Veitch, Satish Babu Korada, Attila Pá...
CONEXT
2005
ACM
13 years 9 months ago
Location based placement of whole distributed systems
The high bandwidth and low latency of the modern internet has made possible the deployment of distributed computing platforms. The XenoServer platform provides a distributed compu...
David Spence, Jon Crowcroft, Steven Hand, Timothy ...
CN
2006
79views more  CN 2006»
13 years 8 months ago
Understanding when location-hiding using overlay networks is feasible
Overlay networks (proxy networks) have been used as a communication infrastructure to allow applications to communicate with users without revealing their IP addresses. Such proxy...
Ju Wang, Andrew A. Chien
WWW
2005
ACM
14 years 8 months ago
WebPod: persistent Web browsing sessions with pocketable storage devices
We present WebPod, a portable system that enables mobile users to use the same persistent, personalized web browsing session on any Internet-enabled device. No matter what compute...
Shaya Potter, Jason Nieh
ISCA
2010
IEEE
239views Hardware» more  ISCA 2010»
14 years 29 days ago
Sentry: light-weight auxiliary memory access control
Light-weight, flexible access control, which allows software to regulate reads and writes to any granularity of memory region, can help improve the reliability of today’s multi...
Arrvindh Shriraman, Sandhya Dwarkadas