Sciweavers

260 search results - page 7 / 52
» Quantifying the performance isolation properties of virtuali...
Sort
View
SIGMETRICS
2004
ACM
106views Hardware» more  SIGMETRICS 2004»
14 years 23 days ago
Quantifying trade-offs in resource allocation for VPNs
Virtual Private Networks (VPNs) feature notable characteristics in structure and traffic patterns that allow for efficient resource allocation. A strategy that exploits the underl...
Satish Raghunath, Shivkumar Kalyanaraman, K. K. Ra...
CORR
2002
Springer
156views Education» more  CORR 2002»
13 years 7 months ago
Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design
Despite recent excitement generated by the peer-to-peer (P2P) paradigm and the surprisingly rapid deployment of some P2P applications, there are few quantitative evaluations of P2...
Matei Ripeanu, Ian T. Foster, Adriana Iamnitchi
SIGMOD
2005
ACM
123views Database» more  SIGMOD 2005»
14 years 7 months ago
Middleware based Data Replication providing Snapshot Isolation
Many cluster based replication solutions have been proposed providing scalability and fault-tolerance. Many of these solutions perform replica control in a middleware on top of th...
Yi Lin, Bettina Kemme, Marta Patiño-Mart&ia...
VEE
2005
ACM
150views Virtualization» more  VEE 2005»
14 years 27 days ago
Diagnosing performance overheads in the xen virtual machine environment
Virtual Machine (VM) environments (e.g., VMware and Xen) are experiencing a resurgence of interest for diverse uses including server consolidation and shared hosting. An applicati...
Aravind Menon, Jose Renato Santos, Yoshio Turner, ...
NDSS
2005
IEEE
14 years 28 days ago
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments
In this paper, we present an approach for realizing a safe execution environment (SEE) that enables users to “try out” new software (or configuration changes to existing soft...
Weiqing Sun, Zhenkai Liang, V. N. Venkatakrishnan,...