Sciweavers

5838 search results - page 1038 / 1168
» A File System for System Programming in Ubiquitous Computing
Sort
View
IPPS
2007
IEEE
15 years 9 months ago
Peak-Performance DFA-based String Matching on the Cell Processor
The security of your data and of your network is in the hands of intrusion detection systems, virus scanners and spam filters, which are all critically based on string matching. ...
Daniele Paolo Scarpazza, Oreste Villa, Fabrizio Pe...
128
Voted
IPPS
2005
IEEE
15 years 9 months ago
COTS Clusters vs. the Earth Simulator: An Application Study Using IMPACT-3D
In 2002, Japan announced the Earth Simulator—a supercomputer based on low-volume vector processors and a custom network—and reported that computational scientists had used it ...
Daniel G. Chavarría-Miranda, Guohua Jin, Jo...
SAC
2005
ACM
15 years 9 months ago
Multi-coordination of mobile agents: a model and a component-based architecture
This paper proposes a model along with a reference software architecture enabling multi-coordination between distributed and mobile software agents. Multi-coordination allows agen...
Giancarlo Fortino, Wilma Russo
IPSN
2005
Springer
15 years 9 months ago
Building up to macroprogramming: an intermediate language for sensor networks
Abstract— There is widespread agreement that a higher level programming model for sensor networks is needed. A variety of models have been developed, but the community is far fro...
Ryan Newton, Arvind, Matt Welsh
138
Voted
VIZSEC
2004
Springer
15 years 9 months ago
Visualizing windows executable viruses using self-organizing maps
This paper concentrates on visualizing computer viruses without using virus specific signature information as a prior stage of the very important problem of detecting computer vi...
InSeon Yoo
« Prev « First page 1038 / 1168 Last » Next »