An evaluation of Amazon's grid computing services: EC2, S3, and SQS

S Garfinkel - 2007 - dash.harvard.edu
Amazon. com's Elastic Compute Cloud (EC2), Simple Storage Service (S3) and Simple
Queue Service (SQS) offer enterprise-class computing, storage and coordination facilities to …

[图书][B] P2P networking and applications

J Buford, H Yu, EK Lua - 2009 - books.google.com
Peer-to-Peer (P2P) networks enable users to directly share digital content (such as audio,
video, and text files) as well as real-time data (such as telephony traffic) with other users …

Uncertainties in the modeling of self-adaptive systems: A taxonomy and an example of availability evaluation

D Perez-Palacin, R Mirandola - Proceedings of the 5th ACM/SPEC …, 2014 - dl.acm.org
The complexity of modern software systems has grown enormously in the past years with
users always demanding for new features and better quality of service. Besides, software is …

Portcullis: Protecting connection setup from denial-of-capability attacks

B Parno, D Wendlandt, E Shi, A Perrig… - ACM SIGCOMM …, 2007 - dl.acm.org
Systems using capabilities to provide preferential service to selected flows have been
proposed as a defense against large-scale network denial-of-service attacks. While these …

The failure trace archive: Enabling comparative analysis of failures in diverse distributed systems

D Kondo, B Javadi, A Iosup… - 2010 10th IEEE/ACM …, 2010 - ieeexplore.ieee.org
With the increasing functionality and complexity of distributed systems, resource failures are
inevitable. While numerous models and algorithms for dealing with failures exist, the lack of …

Learning spatiotemporal failure dependencies for resilient edge computing services

A Aral, I Brandić - IEEE Transactions on Parallel and …, 2020 - ieeexplore.ieee.org
Edge computing services are exposed to infrastructural failures due to geographical
dispersion, ad hoc deployment, and rudimentary support systems. Two unique …

DNS privacy in practice and preparation

C Deccio, J Davis - Proceedings of the 15th International Conference on …, 2019 - dl.acm.org
An increased demand for privacy in Internet communications has resulted in privacy-centric
enhancements to the Domain Name System (DNS), including the use of Transport Layer …

An empirical reexamination of global DNS behavior

H Gao, V Yegneswaran, Y Chen, P Porras… - Proceedings of the …, 2013 - dl.acm.org
The performance and operational characteristics of the DNS protocol are of deep interest to
the research and network operations community. In this paper, we present measurement …

Internet anycast: performance, problems, & potential

Z Li, D Levin, N Spring, B Bhattacharjee - … of the 2018 Conference of the …, 2018 - dl.acm.org
Internet anycast depends on inter-domain routing to direct clients to their" closest" sites.
Using data collected from a root DNS server for over a year (400M+ queries/day from 100+ …

When the dike breaks: Dissecting DNS defenses during DDoS

GCM Moura, J Heidemann, M Müller… - proceedings of the …, 2018 - dl.acm.org
The Internet's Domain Name System (DNS) is a frequent target of Distributed Denial-of-
Service (DDoS) attacks, but such attacks have had very different outcomes---some attacks …