Sciweavers

382 search results - page 75 / 77
» Tracing Network Attacks to Their Sources
Sort
View
EUROSYS
2009
ACM
13 years 11 months ago
Effective and efficient compromise recovery for weakly consistent replication
Weakly consistent replication of data has become increasingly important both for loosely-coupled collections of personal devices and for large-scale infrastructure services. Unfor...
Prince Mahajan, Ramakrishna Kotla, Catherine C. Ma...
ASPLOS
2008
ACM
13 years 9 months ago
Understanding and visualizing full systems with data flow tomography
It is not uncommon for modern systems to be composed of a variety of interacting services, running across multiple machines in such a way that most developers do not really unders...
Shashidhar Mysore, Bita Mazloom, Banit Agrawal, Ti...
ICHIM
2001
104views more  ICHIM 2001»
13 years 8 months ago
The New Norwegian Rock Art Database
The Rock Art Project was set up by the Directorate for Cultural Heritage on behalf of the Norwegian Ministry of the Environment in 1996. The database was initiated within the EU-s...
Wenche Helliksen, Inger Marie Holm-Olsen, Olaug Ha...
CCR
2010
202views more  CCR 2010»
13 years 7 months ago
Understanding data center traffic characteristics
As data centers become more and more central in Internet communications, both research and operations communities have begun to explore how to better design and manage them. In th...
Theophilus Benson, Ashok Anand, Aditya Akella, Min...
IMC
2010
ACM
13 years 5 months ago
Improving content delivery using provider-aided distance information
Content delivery systems constitute a major portion of today's Internet traffic. While they are a good source of revenue for Internet Service Providers (ISPs), the huge volum...
Ingmar Poese, Benjamin Frank, Bernhard Ager, Georg...