Sciweavers

13101 search results - page 2568 / 2621
» The design and implementation of microdrivers
Sort
View
AVI
2008
13 years 10 months ago
Time2Hide: spatial searches and clutter alleviation for the desktop
The desktop metaphor aimed to create a working environment, which would resemble that of the user's desk. With information abundance this desktop is often cluttered with file...
George Lepouras, Aggelos Papatriantafyllou, Akrivi...
LISA
2007
13 years 10 months ago
Assisted Firewall Policy Repair Using Examples and History
Firewall policies can be extremely complex and difficult to maintain, especially on networks with more than a few hundred machines. The difficulty of configuring a firewall proper...
Robert M. Marmorstein, Phil Kearns
NSDI
2007
13 years 10 months ago
Exploiting Similarity for Multi-Source Downloads Using File Handprints
Many contemporary approaches for speeding up large file transfers attempt to download chunks of a data object from multiple sources. Systems such as BitTorrent quickly locate sou...
Himabindu Pucha, David G. Andersen, Michael Kamins...
NSDI
2007
13 years 10 months ago
The Flexlab Approach to Realistic Evaluation of Networked Systems
Networked systems are often evaluated on overlay testbeds such as PlanetLab and emulation testbeds such as Emulab. Emulation testbeds give users great control over the host and ne...
Robert Ricci, Jonathon Duerig, Pramod Sanaga, Dani...
USENIX
2007
13 years 10 months ago
Virtual Machine Memory Access Tracing with Hypervisor Exclusive Cache
Virtual machine (VM) memory allocation and VM consolidation can benefit from the prediction of VM page miss rate at each candidate memory size. Such prediction is challenging for...
Pin Lu, Kai Shen
« Prev « First page 2568 / 2621 Last » Next »