-
1
-
-
68249129760
-
-
Tech. Rep. No. UCB/EECS-2009-28. Berkeley, CA: University of California
-
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., et al. (2009). Above the clouds: A Berkeley view of cloud computing (Tech. Rep. No. UCB/EECS-2009-28). Berkeley, CA: University of California.
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
-
2
-
-
77954500986
-
The case for cyber foraging
-
Balan, R., Flinn, J., Satyanarayanan, M., Sinnamohideen, S., & Yang, H.-I. (2002). The case for cyber foraging. In Proceedings of the 10th ACMSIGOPS European Workshop (pp. 87-92).
-
(2002)
Proceedings of the 10th ACMSIGOPS European Workshop
, pp. 87-92
-
-
Balan, R.1
Flinn, J.2
Satyanarayanan, M.3
Sinnamohideen, S.4
Yang, H.-I.5
-
3
-
-
0019027683
-
Parallelism and recovery in database systems
-
DOI 10.1145/320141.320146
-
Bayer, R., Heller, H., & Reiser, A. (1980). Parallelism and recovery in database systems. ACM Transactions on Database Systems, 5, 139-156. doi:10.1145/320141.320146 (Pubitemid 11436875)
-
(1980)
ACM Transactions on Database Systems
, vol.5
, Issue.2
, pp. 139-156
-
-
Bayer, R.1
Heller, H.2
Reiser, A.3
-
5
-
-
0003567016
-
-
Reading, MA: Addison-Wesley
-
Bernstein, P. A., Hadzilacos, V., & Goodman, N. (1987). Concurrency control and recovery in database systems. Reading, MA: Addison-Wesley.
-
(1987)
Concurrency Control and Recovery in Database Systems
-
-
Bernstein, P.A.1
Hadzilacos, V.2
Goodman, N.3
-
6
-
-
84855434957
-
Protection of buffer overflow attacks via dynamic binary translation
-
Chen, C. C., Hung, S. H., & Lee, C. P (2010). Protection of buffer overflow attacks via dynamic binary translation. Reliable and Autonomous Computational Science, 2, 305-324.
-
(2010)
Reliable and Autonomous Computational Science
, vol.2
, pp. 305-324
-
-
Chen, C.C.1
Hung, S.H.2
Lee, C.P.3
-
8
-
-
77954993714
-
MAUI: Making smartphones last longer with code offload
-
th International Conference on Mobile Systems, Applications, and Services (pp. 49-62).
-
(2010)
th International Conference on Mobile Systems, Applications, and Services
, pp. 49-62
-
-
Cuervo, E.1
Balasubramanian, A.2
Cho, D.-K.3
Wolman, A.4
Saroiu, S.5
Chandra, R.6
-
10
-
-
84870762894
-
-
Retrieved from
-
FUSE. (2010). Filesystem in userspace. Retrieved from http://fuse.sourceforge.net
-
(2010)
Filesystem in Userspace
-
-
-
12
-
-
80052913904
-
-
Retrieved from
-
Google Inc. (2011). Google code project. Retrieved from http://code.google.com
-
(2011)
Google Code Project
-
-
-
13
-
-
0000761412
-
Granularity of locks and degrees of consistency in a shared data base
-
Stonebraker, M. Ed., 2nd ed., San Francisco, CA: Morgan Kaufmann
-
Gray, J. N., Lorie, R. A., Putzolu, G. R., & Traiger, I. L. (1994). Granularity of locks and degrees of consistency in a shared data base. In Stonebraker, M. (Ed.), Readings in database systems (2nd ed., pp. 181-208). San Francisco, CA: Morgan Kaufmann.
-
(1994)
Readings in Database Systems
, pp. 181-208
-
-
Gray, J.N.1
Lorie, R.A.2
Putzolu, G.R.3
Traiger, I.L.4
-
14
-
-
85059766484
-
Live migration of virtual machines
-
Keir, C. C., Clark, C., Fraser, K., Hand, S., Hansen, J. G., Jul, E., et al. (2005). Live migration of virtual machines. In Proceedings of the 2nd ACM/USENIX Symposium on Networked Systems Design and Implementation (pp. 273-286).
-
(2005)
Proceedings of the 2nd ACM/USENIX Symposium on Networked Systems Design and Implementation
, pp. 273-286
-
-
Keir, C.C.1
Clark, C.2
Fraser, K.3
Hand, S.4
Hansen, J.G.5
Jul, E.6
-
15
-
-
85077336034
-
Design tradeoffs in applying content addressable storage to enterprise-scale systems based on virtual machines
-
Nath, P., Kozuch, M. A., O'Hallaron, D. R., Harkes, J., Satyanarayanan, M., Tolia, N., et al. (2006). Design tradeoffs in applying content addressable storage to enterprise-scale systems based on virtual machines. In Proceedings of the USENIX Annual Technical Conference (pp. 363-378).
-
(2006)
Proceedings of the USENIX Annual Technical Conference
, pp. 363-378
-
-
Nath, P.1
Kozuch, M.A.2
O'Hallaron, D.R.3
Harkes, J.4
Satyanarayanan, M.5
Tolia, N.6
-
16
-
-
84978437417
-
The design and implementation of Zap: A system for migrating computing environments
-
Osman, S., Subhraveti, D., Su, G., & Nieh, J. (2002). The design and implementation of Zap: A system for migrating computing environments. In Proceedings ofthe Fifth Symposium on Operating Systems Design and Implementation (pp. 361-376).
-
(2002)
Proceedings Ofthe Fifth Symposium on Operating Systems Design and Implementation
, pp. 361-376
-
-
Osman, S.1
Subhraveti, D.2
Su, G.3
Nieh, J.4
-
18
-
-
40349087553
-
Lift: A lowoverhead practical information flow tracking system for detecting security attacks
-
Qin, F., Wang, C., Li, Z., Kim, H. S., Zhou, Y., & Wu, Y. (2006). Lift: A lowoverhead practical information flow tracking system for detecting security attacks. In Proceedings ofthe 39th Annual IEEE/ ACMInternationalSymposiumonMicroarchitecture (pp. 135-148).
-
(2006)
Proceedings Ofthe 39th Annual IEEE/ ACMInternationalSymposiumonMicroarchitecture
, pp. 135-148
-
-
Qin, F.1
Wang, C.2
Li, Z.3
Kim, H.S.4
Zhou, Y.5
Wu, Y.6
-
19
-
-
0002828775
-
Saving portable computer battery power through remote process execution
-
doi:10.1145/584007.584008
-
Rudenko, A., Reiher, P., Popek, G. J., & Kuenning, G. H. (1998). Saving portable computer battery power through remote process execution. SIGMOBILE Communication Review, 2, 19-26. doi:10.1145/584007.584008
-
(1998)
SIGMOBILE Communication Review
, vol.2
, pp. 19-26
-
-
Rudenko, A.1
Reiher, P.2
Popek, G.J.3
Kuenning, G.H.4
-
20
-
-
34047147413
-
Pervasive personal computing in an Internet Suspend/Resume system
-
DOI 10.1109/MIC.2007.46
-
Satyanarayanan, M., Gilbert, B., Toups, M., Tolia, N., Surie, A., & O'Hallaron, D. (2007). Pervasive personal computing in an internet suspend/resume system. IEEE Internet Computing, 11(2), 16-25. doi:10.1109/MIC.2007.46 (Pubitemid 46511104)
-
(2007)
IEEE Internet Computing
, vol.11
, Issue.2
, pp. 16-25
-
-
Satyanarayanan, M.1
Gilbert, B.2
Toups, M.3
Tolia, N.4
Surie, A.5
O'Hallaron, D.R.6
Wolbach, A.7
Harkes, J.8
Perrig, A.9
Farber, D.J.10
Kozuch, M.A.11
Helfrich, C.J.12
Nath, P.13
Lagar-Cavilla, H.A.14
-
22
-
-
37149049972
-
Securing the distribution and storage of secrets with trusted platform modules
-
Information Security Theory and Practices: Smart Cards, Mobile and Ubiquitous Computing Systems - First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Proceedings, 4462 LNCS
-
Sevinc, P. E., Strasser, M., & Basin, D. (2007). Securing the distribution and storage of secrets with trusted platform modules. In Proceedings ofthe First IFIP TC6/WG8.8/WG11.2 International Conference on Information Security Theory and Practices: Smart Cards, Mobile and Ubiquitous Computing Systems (pp. 53-66). (Pubitemid 350259640)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 53-66
-
-
Sevinc, P.E.1
Strasser, M.2
Basin, D.3
|