Cristina L. Abad
Cristina L. Abad
Professor of Computer Science, Escuela Superior Politécnica del Litoral
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
DARE: Adaptive data replication for efficient cluster scheduling
CL Abad, Y Lu, RH Campbell
Cluster Computing (CLUSTER), 2011 IEEE International Conference on, 159-168, 2011
An analysis on the schemes for detecting and preventing ARP cache poisoning attacks
CL Abad, RI Bonilla
Distributed Computing Systems Workshops, 2007. ICDCSW'07. 27th International …, 2007
Log correlation for intrusion detection: A proof of concept
C Abad, J Taylor, C Sengul, W Yurcik, Y Zhou, K Rowe
Computer Security Applications Conference, 2003. Proceedings. 19th Annual …, 2003
Natjam: Design and Evaluation of Eviction Policies For Supporting Priorities and Deadlines in Mapreduce Clusters
B Cho, M Rahman, T Chajed, I Gupta, C Abad, N Roberts, P Lin
ACM Symposium on Cloud Computing (SOCC), 2013
A Storage-Centric Analysis of MapReduce Workloads: File Popularity, Temporal Locality and Arrival Patterns
Proc. IEEE IISWC, 2012
A survey and comparison of end-system overlay multicast solutions suitable for network-centric warfare
CL Abad, W Yurcik, RH Campbell
Proceedings of SPIE 5441, 215-226, 2004
Preventing ARP cache poisoning attacks: A proof of concept using OpenWrt
AP Ortega, XE Marcos, LD Chiang, CL Abad
2009 Latin American Network Operations and Management Symposium, 1-9, 2009
A SPEC RG cloud group's vision on the performance challenges of FaaS cloud architectures
E van Eyk, A Iosup, CL Abad, J Grohmann, S Eismann
Companion of the 2018 ACM/SPEC International Conference on Performance …, 2018
Visflowconnect: Providing security situational awareness by visualizing network traffic flows
X Yin, W Yurcik, Y Li, K Lakkaraju, C Abad
IEEE International Conference on Performance, Computing, and Communications …, 2004
Pandas: robust locality-aware scheduling with stochastic delay optimality
Q Xie, M Pundir, Y Lu, CL Abad, RH Campbell
IEEE/ACM Transactions on Networking 25 (2), 662-675, 2016
Metadata Traces and Workload Models for Evaluating Big Storage Systems
C Abad, H Luu, N Roberts, K Lee, Y Lu, R Campbell
Proc. IEEE UCC, 2012
Uclog: A unified, correlated logging architecture for intrusion detection
Z Li, J Taylor, E Partridge, Y Zhou, W Yurcik, C Abad, JJ Barlow, ...
the 12th International Conference on Telecommunication Systems-Modeling and …, 2004
Learning through creating learning objects: experiences with a class project in a distributed systems course
CL Abad
ACM SIGCSE Bulletin 40 (3), 255-259, 2008
Generating request streams on Big Data using clustered renewal processes
CL Abad, M Yuan, CX Cai, Y Lu, N Roberts, RH Campbell
Performance Evaluation 70 (10), 704-719, 2013
Adding confidentiality to application-level multicast by leveraging the multicast overlay
C Abad, I Gupta, W Yurcik
25th IEEE International Conference on Distributed Computing Systems …, 2005
Correlation between netflow system and network views for intrusion detection
C Abad, Y Li, K Lakkaraju, X Yin, W Yurcik
Workshop on Link Analysis, Counter-terrorism, and Privacy held in …, 2004
Methodological Principles for Reproducible Performance Evaluation in Cloud Computing
AV Papadopoulos, L Versluis, A Bauer, N Herbst, J Von Kistowski, ...
IEEE Transactions on Software Engineering, 2019
Quantifying cloud performance and dependability: Taxonomy, metric design, and emerging challenges
N Herbst, A Bauer, S Kounev, G Oikonomou, EV Eyk, G Kousiouris, ...
ACM Transactions on Modeling and Performance Evaluation of Computing Systems …, 2018
Package-Aware Scheduling of FaaS Functions
CL Abad, EF Boza, E van Eyk
Companion of the 2018 ACM/SPEC International Conference on Performance …, 2018
Reserved, on demand or serverless: Model-based simulations for cloud budget planning
EF Boza, CL Abad, M Villavicencio, S Quimba, JA Plaza
2017 IEEE Second Ecuador Technical Chapters Meeting (ETCM), 1-6, 2017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20