Sciweavers

483 search results - page 58 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
SEFM
2005
IEEE
15 years 5 months ago
Safe Concurrency for Aggregate Objects with Invariants
Developing safe multithreaded software systems is difficult due to the potential unwanted interference among concurrent threads. This paper presents a flexible methodology for o...
Bart Jacobs 0002, Frank Piessens, K. Rustan M. Lei...
MMMACNS
2005
Springer
15 years 5 months ago
Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes
This paper describes a novel approach for preventative protection from both known and previously unknown malicious software. It does not rely on screening the code for signatures ...
Douglas H. Summerville, Victor A. Skormin, Alexand...
ICMCS
2000
IEEE
172views Multimedia» more  ICMCS 2000»
15 years 4 months ago
Multi Layer Video Object Database based on Interactive Annotation and its Application
As the use of applications employing video contents becomes widespread, it is crucial for representation systems to be able to handle video effectively and flexibly. In this pape...
Tomoyuki Yatabe, Hiroshi Kawasaki, Hiroshi Mo, Mas...
VLDB
2007
ACM
113views Database» more  VLDB 2007»
16 years 1 days ago
Fast nGram-Based String Search Over Data Encoded Using Algebraic Signatures
We propose a novel string search algorithm for data stored once and read many times. Our search method combines the sublinear traversal of the record (as in Boyer Moore or Knuth-M...
Witold Litwin, Riad Mokadem, Philippe Rigaux, Thom...
ICPADS
2006
IEEE
15 years 5 months ago
On-line Evolutionary Resource Matching for Job Scheduling in Heterogeneous Grid Environments
In this paper, we describe a resource matcher (RM) developed for the on-line resource matching in heterogeneous grid environments. RM is based on the principles of Evolutionary Al...
Vijay K. Naik, Pawel Garbacki, Krishna Kummamuru, ...