Search

Search results

  1. Modeling the Parallel Execution of Black-Box Services

    http://www.usenix.org/events/hotcloud11/tech/final_files/Mann.pdf ...

    admin - February 12, 2012 - 8:07 pm

  2. CloudSense: Continuous Fine-Grain Cloud Monitoring with Compressive Sensing

    http://www.usenix.org/events/hotcloud11/tech/final_files/Kung.pdf http://www.usenix.org/events/hotcloud11/tech/slides/kung.pdf ...

    admin - February 12, 2012 - 8:07 pm

  3. Virtual Machine Images as Structured Data: The Mirage Image Library

    http://www.usenix.org/events/hotcloud11/tech/final_files/Ammons.pdf http://www.usenix.org/events/hotcloud11/tech/slides/ammons.pdf ...

    admin - February 12, 2012 - 8:07 pm

  4. Accelerating the Cloud with Heterogeneous Computing

    http://www.usenix.org/events/hotcloud11/tech/final_files/Suneja.pdf http://www.usenix.org/events/hotcloud11/tech/slides/suneja.pdf ...

    admin - October 4, 2012 - 3:05 pm

  5. Unshackle the Cloud!

    http://www.usenix.org/events/hotcloud11/tech/final_files/Williams.pdf http://www.usenix.org/events/hotcloud11/tech/slides/williams.pdf ...

    admin - February 12, 2012 - 8:07 pm

  6. The Datacenter Needs an Operating System

    http://www.usenix.org/events/hotcloud11/tech/final_files/Zaharia.pdf http://www.usenix.org/events/hotcloud11/tech/slides/zaharia.pdf ...

    admin - February 12, 2012 - 8:07 pm

  7. Large-scale Incremental Data Processing with Change Propagation

    http://www.usenix.org/events/hotcloud11/tech/final_files/Bhatotia.pdf http://www.usenix.org/events/hotcloud11/tech/slides/bhatotia.pdf ...

    admin - March 2, 2012 - 9:14 am

  8. TransMR: Data-Centric Programming Beyond Data Parallelism

    http://www.usenix.org/events/hotcloud11/tech/final_files/Rapolu.pdf http://www.usenix.org/events/hotcloud11/tech/slides/rapolu.pdf ...

    admin - February 12, 2012 - 8:07 pm

  9. An Agenda for Empirical Cyber Crime Research

    JOINT ATC, WEBAPPS, AND HOTCLOUD KEYNOTE ADDRESS Computer security is a field that is fundamentally co-dependent—driven to respond by the actions of adversaries. This dance fuels both the research community ...

    admin - February 15, 2012 - 3:12 pm

  10. An Agenda for Empirical Cyber Crime Research

    Computer security is a field that is fundamentally co-dependent—driven to respond by the actions of adversaries. This dance fuels both the research community and a multi-billion-dollar computer security industry. However, to date most efforts have focused ...

    admin - February 15, 2012 - 3:18 pm

Pages