Sciweavers

6303 search results - page 1168 / 1261
» A Generated Management for Distributed Systems
Sort
View
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
15 years 5 months ago
Pushback for Overlay Networks: Protecting Against Malicious Insiders
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although resilient to external Denial of Service attacks, overlay networks can be render...
Angelos Stavrou, Michael E. Locasto, Angelos D. Ke...
IEEEPACT
2006
IEEE
15 years 5 months ago
Fast, automatic, procedure-level performance tuning
This paper presents an automated performance tuning solution, which partitions a program into a number of tuning sections and finds the best combination of compiler options for e...
Zhelong Pan, Rudolf Eigenmann
PPOPP
2006
ACM
15 years 5 months ago
Performance characterization of molecular dynamics techniques for biomolecular simulations
Large-scale simulations and computational modeling using molecular dynamics (MD) continues to make significant impacts in the field of biology. It is well known that simulations...
Sadaf R. Alam, Jeffrey S. Vetter, Pratul K. Agarwa...
ISSTA
2004
ACM
15 years 4 months ago
Testing malware detectors
In today’s interconnected world, malware, such as worms and viruses, can cause havoc. A malware detector (commonly known as virus scanner) attempts to identify malware. In spite...
Mihai Christodorescu, Somesh Jha
ECAI
2004
Springer
15 years 4 months ago
Emergence of Complex Networks through Local Optimization
Abstract. The emergence of complex network structures of relationships between autonomous agents occurs in a wide range of distributed systems. Many researchers have proposed model...
Josep M. Pujol, Andreas Flache, Ramon Sangües...
« Prev « First page 1168 / 1261 Last » Next »