Sciweavers

2024 search results - page 307 / 405
» Providing Secure Environments for Untrusted Network Applicat...
Sort
View
DSN
2002
IEEE
15 years 9 months ago
Transactional Rollback for Language-Based Systems
Language run-time systems are routinely used to host potentially buggy or malicious codelets — software modules, agents, applets, etc. — in a secure environment. A number of t...
Algis Rudys, Dan S. Wallach
AINA
2009
IEEE
15 years 11 months ago
Reliability-Driven Reputation Based Scheduling for Public-Resource Computing Using GA
— For an application in public-resource computing environments, providing reliable scheduling based on resource reliability evaluation is becoming increasingly important. Most ex...
Xiaofeng Wang, Chee Shin Yeo, Rajkumar Buyya, Jins...
SEKE
2007
Springer
15 years 10 months ago
TRAP.NET: A Realization of Transparent Shaping in .NET
We define adaptability as the capacity of software in adjusting its behavior in response to changing conditions. To list just a few examples, adaptability is important in pervasiv...
Seyed Masoud Sadjadi, Fernando Trigoso
IPPS
2006
IEEE
15 years 10 months ago
A distributed paging RAM grid system for wide-area memory sharing
Memory-intensive applications often suffer from the poor performance of disk swapping when memory is inadequate. Remote memory sharing schemes, which provide a remote memory that ...
Rui Chu, Nong Xiao, Yongzhen Zhuang, Yunhao Liu, X...
ECUMN
2007
Springer
15 years 11 months ago
Study and Enhancement of DCCP over DiffServ Assured Forwarding Class
The Datagram Congestion Control Protocol (DCCP) has been proposed as a transport protocol which supports real-time traffic. In this paper, we focus on the use of DCCP/CCID3 (Cong...
Emmanuel Lochin, Guillaume Jourjon, Laurent Dairai...