Cristina L. Abad
Cristina L. Abad
Professor of Computer Science, Escuela Superior Politécnica del Litoral
Verified email at - Homepage
Cited by
Cited by
DARE: Adaptive data replication for efficient cluster scheduling
CL Abad, Y Lu, RH Campbell
Cluster Computing (CLUSTER), 2011 IEEE International Conference on, 159-168, 2011
An analysis on the schemes for detecting and preventing ARP cache poisoning attacks
CL Abad, RI Bonilla
Distributed Computing Systems Workshops, 2007. ICDCSW'07. 27th International …, 2007
Log correlation for intrusion detection: A proof of concept
C Abad, J Taylor, C Sengul, W Yurcik, Y Zhou, K Rowe
Computer Security Applications Conference, 2003. Proceedings. 19th Annual …, 2003
Natjam: Design and Evaluation of Eviction Policies For Supporting Priorities and Deadlines in Mapreduce Clusters
B Cho, M Rahman, T Chajed, I Gupta, C Abad, N Roberts, P Lin
ACM Symposium on Cloud Computing (SOCC), 2013
A Storage-Centric Analysis of MapReduce Workloads: File Popularity, Temporal Locality and Arrival Patterns
Proc. IEEE IISWC, 2012
A SPEC RG cloud group's vision on the performance challenges of FaaS cloud architectures
E van Eyk, A Iosup, CL Abad, J Grohmann, S Eismann
Companion of the 2018 ACM/SPEC International Conference on Performance …, 2018
A survey and comparison of end-system overlay multicast solutions suitable for network-centric warfare
CL Abad, W Yurcik, RH Campbell
Proceedings of SPIE 5441, 215-226, 2004
Preventing ARP cache poisoning attacks: A proof of concept using OpenWrt
AP Ortega, XE Marcos, LD Chiang, CL Abad
2009 Latin American Network Operations and Management Symposium, 1-9, 2009
Visflowconnect: Providing security situational awareness by visualizing network traffic flows
X Yin, W Yurcik, Y Li, K Lakkaraju, C Abad
IEEE International Conference on Performance, Computing, and Communications …, 2004
Methodological Principles for Reproducible Performance Evaluation in Cloud Computing
AV Papadopoulos, L Versluis, A Bauer, N Herbst, J Von Kistowski, ...
IEEE Transactions on Software Engineering, 2019
Metadata Traces and Workload Models for Evaluating Big Storage Systems
C Abad, H Luu, N Roberts, K Lee, Y Lu, R Campbell
Proc. IEEE UCC, 2012
Pandas: robust locality-aware scheduling with stochastic delay optimality
Q Xie, M Pundir, Y Lu, CL Abad, RH Campbell
IEEE/ACM Transactions on Networking 25 (2), 662-675, 2016
Uclog: A unified, correlated logging architecture for intrusion detection
Z Li, J Taylor, E Partridge, Y Zhou, W Yurcik, C Abad, JJ Barlow, ...
the 12th International Conference on Telecommunication Systems-Modeling and …, 2004
Learning through creating learning objects: experiences with a class project in a distributed systems course
CL Abad
ACM SIGCSE Bulletin 40 (3), 255-259, 2008
The SPEC-RG Reference Architecture for FaaS: From Microservices and Containers to Serverless Platforms
E Van Eyk, J Grohmann, S Eismann, A Bauer, L Versluis, L Toader, ...
IEEE Internet Computing 23 (6), 7-18, 2019
Serverless Applications: Why, When, and How?
S Eismann, J Scheuner, E van Eyk, M Schwinger, J Grohmann, N Herbst, ...
IEEE Software 38 (1), 32-39, 2020
Adding confidentiality to application-level multicast by leveraging the multicast overlay
C Abad, I Gupta, W Yurcik
25th IEEE International Conference on Distributed Computing Systems …, 2005
Quantifying cloud performance and dependability: Taxonomy, metric design, and emerging challenges
N Herbst, A Bauer, S Kounev, G Oikonomou, EV Eyk, G Kousiouris, ...
ACM Transactions on Modeling and Performance Evaluation of Computing Systems …, 2018
A review of serverless use cases and their characteristics
S Eismann, J Scheuner, E van Eyk, M Schwinger, J Grohmann, N Herbst, ...
arXiv preprint arXiv:2008.11110, 2020
Package-Aware Scheduling of FaaS Functions
CL Abad, EF Boza, E van Eyk
Companion of the 2018 ACM/SPEC International Conference on Performance …, 2018
The system can't perform the operation now. Try again later.
Articles 1–20