Jeanna Matthews
Jeanna Matthews
Professor, Department of Computer Science, Clarkson University
Email verificata su clarkson.edu - Home page
Titolo
Citata da
Citata da
Anno
Serverless network file systems
TE Anderson, MD Dahlin, JM Neefe, DA Patterson, DS Roselli, RY Wang
SOSP '95 Proceedings of the fifteenth ACM symposium on Operating systems …, 1995
7021995
Serverless network file systems
TE Anderson, MD Dahlin, JM Neefe, DA Patterson, DS Roselli, RY Wang
ACM Transactions on Computer Systems (TOCS) 14 (1), 41-79, 1996
4711996
Xen and the Art of Repeated Research.
B Clark, T Deshane, EM Dow, S Evanchik, M Finlayson, J Herne, ...
USENIX Annual Technical Conference, FREENIX Track, 135-144, 2004
2422004
Improving the performance of log-structured file systems with adaptive methods
JN Matthews, D Roselli, AM Costello, RY Wang, TE Anderson
ACM SIGOPS Operating Systems Review 31 (5), 238-251, 1997
2351997
Quantifying the performance isolation properties of virtualization systems
JN Matthews, W Hu, M Hapuarachchi, T Deshane, D Dimatos, G Hamilton, ...
Proceedings of the 2007 workshop on Experimental computer science, 6-es, 2007
2212007
System boot time reduction method
RL Coulson, JI Garney, JN Matthews, RJ Royer
US Patent 6,920,533, 2005
2082005
Quantitative comparison of Xen and KVM
T Deshane, Z Shepherd, J Matthews, M Ben-Yehuda, A Shah, B Rao
Xen Summit, Boston, MA, USA, 1-2, 2008
1792008
The good, the bad and the ugly of consumer cloud storage
W Hu, T Yang, JN Matthews
ACM SIGOPS Operating Systems Review 44 (3), 110-115, 2010
1212010
Intel® Turbo Memory: Nonvolatile disk caches in the storage hierarchy of mainstream computer systems
J Matthews, S Trika, D Hensgen, R Coulson, K Grimsrud
ACM Transactions on Storage (TOS) 4 (2), 1-24, 2008
1182008
Running Xen: a hands-on guide to the art of virtualization
JN Matthews, EM Dow, T Deshane, W Hu, J Bongio, PF Wilbur, ...
Prentice Hall PTR, 2008
1102008
Technique to write to a non-volatile memory
SN Trika, RW Faber, R Coulson, JN Matthews
US Patent 7,797,479, 2010
922010
A quantitative study of virtual machine live migration
W Hu, A Hicks, L Zhang, EM Dow, V Soni, H Jiang, R Bull, JN Matthews
Proceedings of the 2013 ACM cloud and autonomic computing conference, 1-10, 2013
842013
A study of passwords and methods used in brute-force SSH attacks
J Owens, J Matthews
USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2008
822008
Quantitative analysis of intrusion detection systems: Snort and Suricata
JS White, T Fitzsimmons, JN Matthews
Cyber sensing 2013 8757, 875704, 2013
722013
Virtual machine contracts for datacenter and cloud computing environments
J Matthews, T Garfinkel, C Hoff, J Wheeler
Proceedings of the 1st workshop on Automated control for datacenters and …, 2009
712009
Preventing storage of streaming accesses in a cache
JN Matthews, JI Garney
US Patent 7,360,015, 2008
662008
Computer networking: Internet protocols in action
J Matthews
John Wiley & Sons, 2005
602005
Data protection and rapid recovery from attack with a virtual private file server and virtual machine appliances
J Matthews, JJ Herne, TM Deshane, PA Jablonski, LR Cherian, ...
Proceedings of the IASTED International Conference on Communication, Network …, 2005
502005
An attack-resistant and rapid recovery desktop system
T Deshane, J Matthews
Clarkson University, Potsdam, NY, 2010
482010
An exploration of network RAM
EA Anderson, JM Neefe
University of California, Berkeley, Computer Science Division, 1998
461998
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20