Sciweavers

6844 search results - page 1314 / 1369
» Web Service Security
Sort
View
SOSP
2007
ACM
14 years 5 months ago
Dynamo: amazon's highly available key-value store
Reliability at massive scale is one of the biggest challenges we face at Amazon.com, one of the largest e-commerce operations in the world; even the slightest outage has significa...
Giuseppe DeCandia, Deniz Hastorun, Madan Jampani, ...
ICC
2009
IEEE
150views Communications» more  ICC 2009»
14 years 3 months ago
Modeling Human Behavior for Defense Against Flash-Crowd Attacks
—Flash-crowd attacks are the most vicious form of distributed denial of service (DDoS). They flood the victim with service requests generated from numerous bots. Attack requests...
Georgios Oikonomou, Jelena Mirkovic
ICPP
2009
IEEE
14 years 3 months ago
Using Standards-Based Interfaces to Share Data across Grid Infrastructures
—Data grids, such as the ones used by the high energy physics community, are used to share vast amounts of data across geographic locations. However, interactions with grid data ...
Karolina Sarnowska, Andrew S. Grimshaw, Erwin Laur...
NOMS
2008
IEEE
175views Communications» more  NOMS 2008»
14 years 3 months ago
Analysis of application performance and its change via representative application signatures
Abstract—Application servers are a core component of a multitier architecture that has become the industry standard for building scalable client-server applications. A client com...
Ningfang Mi, Ludmila Cherkasova, Kivanc M. Ozonat,...
CIVR
2007
Springer
128views Image Analysis» more  CIVR 2007»
14 years 3 months ago
3D-Model search engine from photos
In this paper, we present the FOX-MIIRE 3D-Model Search Engine. Our search engine is based on Adaptive Views Vlustering (AVC) algorithm [4]. The AVC method uses statistical model ...
Tarik Filali Ansary, Jean-Philippe Vandeborre, Moh...
« Prev « First page 1314 / 1369 Last » Next »