Sciweavers

3679 search results - page 2 / 736
» Virtual Networks on Demand
Sort
View
EUROSYS
2006
ACM
14 years 4 months ago
Practical taint-based protection using demand emulation
Many software attacks are based on injecting malicious code into a target host. This paper demonstrates the use of a wellknown technique, data tainting, to track data received fro...
Alex Ho, Michael A. Fetterman, Christopher Clark, ...
ICWS
2007
IEEE
13 years 9 months ago
Capacity Management and Demand Prediction for Next Generation Data Centers
Advances in server, network, and storage virtualization are enabling the creation of resource pools of servers that permit multiple application workloads to share each server in t...
Daniel Gmach, Jerry Rolia, Ludmila Cherkasova, Alf...
MM
1996
ACM
102views Multimedia» more  MM 1996»
13 years 11 months ago
A Quality Planning Model for Distributed Multimedia in the Virtual Cockpit
Tomorrow's multimedia applications will stress all parts of a computer system. To determine the computer resources needed to meet application demands we have developed a new ...
Mark Claypool, John Riedl
CCR
2010
111views more  CCR 2010»
13 years 5 months ago
Monitoring a virtual network infrastructure: an IaaS perspective
Infrastructure as a Service (IaaS) providers keep extending with new features the computing infrastructures they offer on a pay per use basis. In this paper we explore reasons and...
Augusto Ciuffoletti
BROADNETS
2007
IEEE
14 years 1 months ago
On the stability of virtual network topology control for overlay routing services
Abstract— Overlay networks achieve new functionality and enhance network performance by allowing routing to be controlled at the application layer. However, these approaches resu...
Yuki Koizumi, Takashi Miyamura, Shin'ichi Arakawa,...