Sciweavers

16832 search results - page 3237 / 3367
» Scenario Based Evaluation
Sort
View
SIGMETRICS
2010
ACM
177views Hardware» more  SIGMETRICS 2010»
14 years 3 months ago
Managing the cost, energy consumption, and carbon footprint of internet services
The large amount of energy consumed by Internet services represents significant and fast-growing financial and environmental costs. Increasingly, services are exploring dynamic ...
Kien Le, Ozlem Bilgir, Ricardo Bianchini, Margaret...
SIGMETRICS
2010
ACM
212views Hardware» more  SIGMETRICS 2010»
14 years 3 months ago
A mean field model of work stealing in large-scale systems
In this paper, we consider a generic model of computational grids, seen as several clusters of homogeneous processors. In such systems, a key issue when designing efficient job al...
Nicolas Gast, Bruno Gaujal
SIGMOD
2010
ACM
227views Database» more  SIGMOD 2010»
14 years 3 months ago
SecureBlox: customizable secure distributed data processing
We present SecureBlox, a declarative system that unifies a distributed query processor with a security policy framework. SecureBlox decouples security concerns from system speci...
William R. Marczak, Shan Shan Huang, Martin Braven...
SIGMOD
2010
ACM
211views Database» more  SIGMOD 2010»
14 years 3 months ago
ERACER: a database approach for statistical inference and data cleaning
Real-world databases often contain syntactic and semantic errors, in spite of integrity constraints and other safety measures incorporated into modern DBMSs. We present ERACER, an...
Chris Mayfield, Jennifer Neville, Sunil Prabhakar
NOSSDAV
2010
Springer
14 years 3 months ago
RTP-miner: a real-time security framework for RTP fuzzing attacks
Real-time Transport Protocol (RTP) is a widely adopted standard for transmission of multimedia traffic in Internet telephony (commonly known as VoIP). Therefore, it is a hot poten...
M. Ali Akbar, Muddassar Farooq
« Prev « First page 3237 / 3367 Last » Next »