Sciweavers

1855 search results - page 175 / 371
» A coding theorem for distributed computation
Sort
View
128
Voted
WORDS
2003
IEEE
15 years 9 months ago
Object and Process Migration in .NET
Most of today’s distributed computing systems in the field do not support the migration of execution entities among computing nodes during runtime. The relatively static associa...
Peter Tröger, Andreas Polze
120
Voted
IPPS
2007
IEEE
15 years 10 months ago
An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection
Since current internet threats contain not only malicious codes like Trojan or worms, but also spyware and adware which do not have explicit illegal content, it is necessary to hav...
Like Zhang, Gregory B. White
149
Voted
IPPS
2005
IEEE
15 years 9 months ago
Some Issues in Solving the Anomaly Detection Problem using Immunological Approach
Results of an experimental study of an anomaly detection system based on the paradigm of artificial immune systems (AISs) are presented. Network traffic data are mapped into ant...
Franciszek Seredynski, Pascal Bouvry
112
Voted
ICDCS
2003
IEEE
15 years 9 months ago
Monotonicity and Partial Results Protection for Mobile Agents
Remotely executing mobile code introduces a plethora of security problems. This paper examines the “external agent replay” attack, identifies the notion of one-way program st...
Bennet S. Yee
123
Voted
IPPS
1998
IEEE
15 years 8 months ago
DEEP: A Development Environment for Parallel Programs
The use of the DEEP development environment to analyze parallel program performance is described. The full integrated environment contains tools for the creation, analysis and deb...
Brian Q. Brode, Chris R. Warber