PERG is a pattern matching engine designed for locating predefined byte string patterns (rules) from the ClamAV virus signature database in a data stream. This paper presents PERG...
Source Control Repositories are used in most software projects to store revisions to source code files. These repositories operate at the file level and support multiple users. ...
We present a performance analysis of an agent-based middleware system we have developed based on "reAgents," remotely executing agents that enhance the performance of cl...
The lack of automation associated with network operations in general and network configuration management in particular, is widely recognized as a significant contributing factor ...
Xu Chen, Zhuoqing Morley Mao, Jacobus E. van der M...
Many applications in analytical domains often have the need to "connect the dots" i.e., query about the structure of data. In bioinformatics for example, it is typical t...