Sciweavers

68 search results - page 9 / 14
» Triage: performance isolation and differentiation for storag...
Sort
View
SISW
2005
IEEE
14 years 1 months ago
Towards Protecting Sensitive Files in a Compromised System
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Xin Zhao, Kevin Borders, Atul Prakash
COMPUTER
2004
105views more  COMPUTER 2004»
13 years 7 months ago
SoftUDC: A Software-Based Data Center for Utility Computing
, abstracts each virtual machine's view of its storage and networks, and binds virtual machines across nodes into isolated virtual farms. The SoftUDC control system spans all ...
Mahesh Kallahalla, Mustafa Uysal, Ram Swaminathan,...
ICIP
2008
IEEE
14 years 1 months ago
Model-based compression of nonstationary landmark shape sequences
We have proposed a novel model-based compression technique for nonstationary landmark shape data extracted from video sequences. The main goal is to develop a technique for the co...
Samarjit Das, Namrata Vaswani
ISCA
2007
IEEE
149views Hardware» more  ISCA 2007»
14 years 1 months ago
Virtual private caches
Virtual Private Machines (VPM) provide a framework for Quality of Service (QoS) in CMP-based computer systems. VPMs incorporate microarchitecture mechanisms that allow shares of h...
Kyle J. Nesbit, James Laudon, James E. Smith
CCGRID
2002
IEEE
14 years 13 days ago
Agent-Based Resource Management for Grid Computing
It is envisaged that the grid infrastructure will be a large-scale distributed software system that will provide high-end computational and storage capabilities to differentiated ...
Junwei Cao, Daniel P. Spooner, James D. Turner, St...