Sciweavers

Share
5 search results - page 1 / 1
» Evaluation of Distributed File Integrity Analyzers in the Pr...
Sort
View
IJNSEC
2007
95views more  IJNSEC 2007»
9 years 11 months ago
Evaluation of Distributed File Integrity Analyzers in the Presence of Tampering
In this paper, the Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions (CONFIDANT) is evaluated in the presence of tampering. CO...
Adam J. Rocke, Ronald F. DeMara, Simon Foo
BMCBI
2016
60views more  BMCBI 2016»
4 years 8 months ago
MetaCRAM: an integrated pipeline for metagenomic taxonomy identification and compression
Background: Metagenomics is a genomics research discipline devoted to the study of microbial communities in environmental samples and human and animal organs and tissues. Sequence...
MinJi Kim, Xiejia Zhang, Jonathan G. Ligo, Farzad ...
JIPS
2007
223views more  JIPS 2007»
9 years 11 months ago
Addressing Mobile Agent Security through Agent Collaboration
: The use of agent paradigm in today’s applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execut...
Evens Jean, Yu Jiao, Ali R. Hurson
EDOC
2004
IEEE
10 years 3 months ago
Evaluating the Performance of Middleware Load Balancing Strategies
This paper presents three contributions to research on middleware load balancing. First, it describes the design of Cygnus, which is an extensible open-source middleware framework...
Jaiganesh Balasubramanian, Douglas C. Schmidt, Law...
HPCA
2006
IEEE
11 years 5 days ago
An approach for implementing efficient superscalar CISC processors
An integrated, hardware / software co-designed CISC processor is proposed and analyzed. The objectives are high performance and reduced complexity. Although the x86 ISA is targete...
Shiliang Hu, Ilhyun Kim, Mikko H. Lipasti, James E...
books