, abstracts each virtual machine's view of its storage and networks, and binds virtual machines across nodes into isolated virtual farms. The SoftUDC control system spans all ...
Mahesh Kallahalla, Mustafa Uysal, Ram Swaminathan,...
The monitoring of packets destined for reachable, yet unused, Internet addresses has proven to be a useful technique for measuring a variety of specific Internet phenomenon (e.g.,...
Eric Wustrow, Manish Karir, Michael Bailey, Farnam...
ABSTRACT Digital computer networks represent a disruptive technology, with the potential to create or destroy economic value in established industries. These opportunities and chal...
This paper presents a search architecture that combines classical search techniques with spread activation techniques applied to a semantic model of a given domain. Given an ontol...
Cristiano Rocha, Daniel Schwabe, Marcus Poggi de A...
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...