Sciweavers

44 search results - page 5 / 9
» Replica Placement and Access Policies in Tree Networks
Sort
View
IPPS
2005
IEEE
14 years 28 days ago
On the Optimal Placement of Secure Data Objects over Internet
Secret sharing algorithms have been used for intrusion tolerance, which ensure the confidentiality, integrity and availability of critical information. However, dynamically changi...
Manghui Tu, Peng Li, Qingkai Ma, I-Ling Yen, Farok...
DSN
2008
IEEE
14 years 1 months ago
An integrated approach to resource pool management: Policies, efficiency and quality metrics
: The consolidation of multiple servers and their workloads aims to minimize the number of servers needed thereby enabling the efficient use of server and power resources. At the s...
Daniel Gmach, Jerry Rolia, Ludmila Cherkasova, Gui...
CONCURRENCY
2002
112views more  CONCURRENCY 2002»
13 years 7 months ago
The Virtual Service Grid: an architecture for delivering high-end network services
This paper presents the design of a novel system architecture, Virtual Service Grid (VSG), for delivering high performance network services. The VSG is based on the concept of the...
Jon B. Weissman, Byoung-Dai Lee
COLCOM
2008
IEEE
14 years 1 months ago
Replication in Overlay Networks: A Multi-objective Optimization Approach
Recently, overlay network-based collaborative applications such as instant messaging, content sharing, and Internet telephony are becoming increasingly popular. Many of these appli...
Osama Al-Haj Hassan, Lakshmish Ramaswamy, John A. ...
NGC
2001
Springer
116views Communications» more  NGC 2001»
13 years 11 months ago
Scalable IP Multicast Sender Access Control for Bi-directional Trees
Bi-directional shared tree is an efficient routing scheme for interactive multicast applications with multiple sources. Given the open-group IP multicast service model, it is impor...
Ning Wang, George Pavlou