Modular Research-Based Composably Trustworthy Mission-Oriented Resilient Clouds (MRC2)
暂无分享,去创建一个
Andrew W. Moore | Peter G. Neumann | Brooks Davis | Steven Hand | Jonathan Anderson | Phillip A. Porras | Simon W. Moore | Jonathan Woodruff | Malte Schwarzkopf | Anil Madhavapeddy | Nirav Dave | Alexandre Joannou | Prashanth Mundkur | Charalampos Rotsos | Alan Mujumdar | Colin Rothwell | Robert Norton | Phillip Porras | Vinod Yegneswaran | Robert N. M. Watson | Jong H Han | Alex Horsman | Matt Huxtable | Theo Markettos | Bjoern A. Zeeb | V. Yegneswaran | Malte Schwarzkopf | S. Hand | R. Watson | Charalampos Rotsos | S. Moore | A. Moore | P. Neumann | Nirav H. Dave | A. Mujumdar | Jonathan Woodruff | J. Anderson | Brooks Davis | Alexandre Joannou | Robert M. Norton | Anil Madhavapeddy | Colin Rothwell | J. H. Han | Alex Horsman | Matthew Huxtable | Theo Markettos | Prashanth Mundkur
[1] Mark Handley,et al. Improving datacenter performance and robustness with multipath TCP , 2011, SIGCOMM 2011.
[2] Luiz André Barroso,et al. The Datacenter as a Computer: An Introduction to the Design of Warehouse-Scale Machines , 2009, The Datacenter as a Computer: An Introduction to the Design of Warehouse-Scale Machines.
[3] Amin Vahdat,et al. Helios: a hybrid electrical/optical switch architecture for modular data centers , 2010, SIGCOMM '10.
[4] Srinivas Devadas,et al. Heracles: Fully Synthesizable Parameterized MIPS-Based Multicore System , 2011, 2011 21st International Conference on Field Programmable Logic and Applications.
[5] Rob Sherwood,et al. OFLOPS: An Open Framework for OpenFlow Switch Evaluation , 2012, PAM.
[6] Steven Hand,et al. Resource Provisioning for Multi-Tier Virtualized Server Applications , 2010 .
[7] Peter G. Neumann,et al. The CHERI capability model: Revisiting RISC in an age of risk , 2014, 2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA).
[8] Angelos Bilas,et al. Towards 100 gbit/s ethernet: multicore-based parallel communication protocol design , 2009, ICS '09.
[9] Saurabh Dighe,et al. The 48-core SCC Processor: the Programmer's View , 2010, 2010 ACM/IEEE International Conference for High Performance Computing, Networking, Storage and Analysis.
[10] P.M. Watts,et al. Requirements of low power photonic networks for Distributed Shared Memory computers , 2011, 2011 Optical Fiber Communication Conference and Exposition and the National Fiber Optic Engineers Conference.
[11] Hari Balakrishnan,et al. Fast portscan detection using sequential hypothesis testing , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[12] Dawson R. Engler,et al. Fast and flexible application-level networking on exokernel systems , 2002, TOCS.
[13] Simon W. Moore,et al. A generic synthesisable test bench , 2015, 2015 ACM/IEEE International Conference on Formal Methods and Models for Codesign (MEMOCODE).
[14] Niels Provos,et al. Preventing Privilege Escalation , 2003, USENIX Security Symposium.
[15] EDDIE KOHLER,et al. The click modular router , 2000, TOCS.
[16] Vern Paxson,et al. On the Adaptive Real-Time Detection of Fast-Propagating Network Worms , 2007, DIMVA.
[17] Martín Casado,et al. NOX: towards an operating system for networks , 2008, CCRV.
[18] Richard Sharp,et al. Using functional programming within an industrial product group: perspectives and perceptions , 2010, ICFP '10.
[19] Adrian Schüpbach,et al. The multikernel: a new OS architecture for scalable multicore systems , 2009, SOSP '09.
[20] George C. Necula,et al. CIL: Intermediate Language and Tools for Analysis and Transformation of C Programs , 2002, CC.
[21] Muli Ben-Yehuda,et al. The Turtles Project: Design and Implementation of Nested Virtualization , 2010, OSDI.
[22] Amar Phanishayee,et al. Safe and effective fine-grained TCP retransmissions for datacenter communication , 2009, SIGCOMM '09.
[23] Steven Hand,et al. Improving Xen security through disaggregation , 2008, VEE '08.
[24] Nick McKeown,et al. OpenFlow: enabling innovation in campus networks , 2008, CCRV.
[25] Jay Lepreau,et al. The Flux OSKit: a substrate for kernel and language research , 1997, SOSP.
[26] Larry L. Peterson,et al. Making paths explicit in the Scout operating system , 1996, OSDI '96.
[27] Mark Handley,et al. The Case for Ubiquitous Transport-Level Encryption , 2010, USENIX Security Symposium.
[28] Injong Rhee,et al. CUBIC: a new TCP-friendly high-speed TCP variant , 2008, OPSR.
[29] T. N. Vijaykumar,et al. Deadline-aware datacenter tcp (D2TCP) , 2012, CCRV.
[30] Vyas Sekar,et al. A Multi-Resolution Approach forWorm Detection and Containment , 2006, International Conference on Dependable Systems and Networks (DSN'06).
[31] Andrew Warfield,et al. Live migration of virtual machines , 2005, NSDI.
[32] George C. Necula,et al. CCured: type-safe retrofitting of legacy code , 2002, SIGP.
[33] James R. Larus,et al. Sealing OS processes to improve dependability and safety , 2007, EuroSys '07.
[34] David R. Cheriton,et al. The V distributed system , 1988, CACM.
[35] Philip Heidelberger,et al. The IBM Blue Gene/Q interconnection network and message unit , 2011, 2011 International Conference for High Performance Computing, Networking, Storage and Analysis (SC).
[36] Andrew R. Cherenson,et al. The Sprite network operating system , 1988, Computer.
[37] Yuan Yu,et al. Dryad: distributed data-parallel programs from sequential building blocks , 2007, EuroSys '07.
[38] Sanjay Ghemawat,et al. MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.
[39] Guang R. Gao,et al. A study of the on-chip interconnection network for the IBM Cyclops64 multi-core architecture , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
[40] Thomas Gazagnaire,et al. OXenstored: an efficient hierarchical and transactional database using functional programming with reference cell comparisons , 2009, ICFP.
[41] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[42] Vinod Yegneswaran,et al. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.
[43] Jun Zhu,et al. Breaking up is hard to do: security and functionality in a commodity hypervisor , 2011, SOSP.
[44] Robin Fairbairns,et al. The Design and Implementation of an Operating System to Support Distributed Multimedia Applications , 1996, IEEE J. Sel. Areas Commun..
[45] Michael K. Reiter,et al. Are Your Hosts Trading or Plotting? Telling P2P File-Sharing and Bots Apart , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[46] Mahadev Konar,et al. ZooKeeper: Wait-free Coordination for Internet-scale Systems , 2010, USENIX Annual Technical Conference.
[47] Albert G. Greenberg,et al. Data center TCP (DCTCP) , 2010, SIGCOMM '10.
[48] Robbert van Renesse,et al. Amoeba: a distributed operating system for the 1990s , 1990, Computer.
[49] David A. Maltz,et al. Network traffic characteristics of data centers in the wild , 2010, IMC '10.
[50] Guofei Gu,et al. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection , 2008, USENIX Security Symposium.
[51] Mark Handley,et al. How Hard Can It Be? Designing and Implementing a Deployable Multipath TCP , 2012, NSDI.
[52] Antony Rowstron,et al. Symbiotic routing in future data centers , 2010, SIGCOMM 2010.
[53] Alan L. Cox,et al. Maestro: A System for Scalable OpenFlow Control , 2010 .
[54] Yehuda Koren,et al. The BellKor solution to the Netflix Prize , 2007 .