Sciweavers

DSN
2008
IEEE
14 years 6 months ago
An integrated approach to resource pool management: Policies, efficiency and quality metrics
: The consolidation of multiple servers and their workloads aims to minimize the number of servers needed thereby enabling the efficient use of server and power resources. At the s...
Daniel Gmach, Jerry Rolia, Ludmila Cherkasova, Gui...
DSN
2008
IEEE
14 years 6 months ago
BAR primer
Allen Clement, Harry C. Li, Jeff Napper, Jean-Phil...
DSN
2008
IEEE
14 years 6 months ago
A fault-tolerant directory-based cache coherence protocol for CMP architectures
Current technology trends of increased scale of integration are pushing CMOS technology into the deepsubmicron domain, enabling the creation of chips with a significantly greater...
Ricardo Fernández Pascual, José M. G...
DSN
2008
IEEE
14 years 6 months ago
On localization attacks to Internet Threat Monitors: An information-theoretic framework
Internet Threat Monitoring (ITM) systems are a widely deployed facility to detect, analyze, and characterize dangerous Internet threats such as worms and distributed denial-of-ser...
Wei Yu, Nan Zhang 0004, Xinwen Fu, Riccardo Bettat...
DSN
2008
IEEE
14 years 6 months ago
WS-DREAM: A distributed reliability assessment Mechanism for Web Services
It is critical to guarantee the reliability of serviceoriented applications. This is because they may employ remote Web Services as components, which may easily become unavailable...
Zibin Zheng, Michael R. Lyu
DSN
2008
IEEE
14 years 6 months ago
Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change
: Automated tools for understanding application behavior and its changes during the application life-cycle are essential for many performance analysis and debugging tasks. Applicat...
Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi,...
DSN
2008
IEEE
14 years 6 months ago
TCP covert timing channels: Design and detection
Exploiting packets’ timing information for covert communication in the Internet has been explored by several network timing channels and watermarking schemes. Several of them em...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
DSN
2008
IEEE
14 years 6 months ago
Tempest: Soft state replication in the service tier
Soft state in the middle tier is key to enabling scalable and responsive three tier service architectures. While softstate can be reconstructed upon failure, replicating it across...
Tudor Marian, Mahesh Balakrishnan, Ken Birman, Rob...
DSN
2008
IEEE
14 years 6 months ago
Probabilistic quorum systems in wireless ad hoc networks
Quorums are a basic construct in solving many fundamental distributed computing problems. One of the known ways of making quorums scalable and efficient is by weakening their int...
Roy Friedman, Gabriel Kliot, Chen Avin
DSN
2008
IEEE
14 years 6 months ago
Evaluating email's feasibility for botnet command and control
The usefulness ofemail has been tempered by its role in the widespread distribution ofspam and malicious content. Security solutions have.focused on filtering out malicious payloa...
Kapil Singh, Abhinav Srivastava, Jonathon T. Giffi...