Sciweavers

9231 search results - page 1575 / 1847
» informs 2008
Sort
View
LISA
2008
15 years 7 months ago
Topnet: A Network-aware top(1)
System administrators regularly use the top utility for understanding the resource consumption of the processes running on UNIX computers. Top provides an accurate and real-time d...
Antonis Theocharides, Demetres Antoniades, Michali...
NSDI
2008
15 years 7 months ago
One Hop Reputations for Peer to Peer File Sharing Workloads
An emerging paradigm in peer-to-peer (P2P) networks is to explicitly consider incentives as part of the protocol design in order to promote good (or discourage bad) behavior. Howe...
Michael Piatek, Tomas Isdal, Arvind Krishnamurthy,...
NSDI
2008
15 years 7 months ago
Efficiency Through Eavesdropping: Link-layer Packet Caching
The broadcast nature of wireless networks is the source of both their utility and much of their complexity. To turn what would otherwise be unwanted interference into an advantage...
Mikhail Afanasyev, David G. Andersen, Alex C. Snoe...
USENIX
2008
15 years 7 months ago
Power-aware Remote Replication for Enterprise-level Disaster Recovery Systems
Electric energy consumed in data centers is rapidly growing. Power-aware IT, recently called `green IT', is widely recognized as a significant challenge. Disk storage is a no...
Kazuo Goda, Masaru Kitsuregawa
USS
2008
15 years 7 months ago
Securing Provenance
Provenance describes how an object came to be in its present state. Intelligence dossiers, medical records and corporate financial reports capture provenance information. Many of ...
Uri Braun, Avraham Shinnar, Margo I. Seltzer
« Prev « First page 1575 / 1847 Last » Next »