Sciweavers

1033 search results - page 77 / 207
» Redistribution in distributed Ada
Sort
View
KBSE
2005
IEEE
15 years 9 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
HT
2005
ACM
15 years 9 months ago
Processing link structures and linkbases in the web's open world linking
Hyperlinks are an essential feature of the World Wide Web, highly responsible for its success. XLink improves on HTML’s linking capabilities in several ways. In particular, link...
François Bry, Michael Eckert
SC
2005
ACM
15 years 9 months ago
VSched: Mixing Batch And Interactive Virtual Machines Using Periodic Real-time Scheduling
We are developing Virtuoso, a system for distributed computing using virtual machines (VMs). Virtuoso must be able to mix batch and interactive VMs on the same physical hardware, ...
Bin Lin, Peter A. Dinda
SIGECOM
2005
ACM
117views ECommerce» more  SIGECOM 2005»
15 years 9 months ago
First-price path auctions
We study first-price auction mechanisms for auctioning flow between given nodes in a graph. A first-price auction is any auction in which links on winning paths are paid their ...
Nicole Immorlica, David R. Karger, Evdokia Nikolov...
ATAL
2005
Springer
15 years 9 months ago
Sequential auctions for objects with common and private values
Sequential auctions are an important mechanism for buying/selling multiple objects. Existing work has studied sequential auctions for objects that are exclusively either common va...
S. Shaheen Fatima, Michael Wooldridge, Nicholas R....