— As the Service Oriented Architecture (SOA) principles have gained importance, an emerging need has appeared for methodologies to locate desired services that provide access to ...
Mehmet S. Aktas, Sangyoon Oh, Geoffrey Fox, Marlon...
Careless development of web-based applications results in vulnerable code being deployed and made available to the whole Internet, creating easily-exploitable entry points for the...
Fredrik Valeur, Giovanni Vigna, Christopher Kr&uum...
Circulant graphs have been deeply studied in technical literature. Midimew networks are a class of distancerelated optimal circulant graphs of degree four which have applications ...
Malicious codes and worms comprise the largest portion of the loss caused the security problem in the Internet. Small worms such as the “Blaster” spread quickly through the eno...
Jangha Kim, Kanghee Lee, Sangwook Kim, Jungtaek Se...
Abstract. IBM is currently developing the new line of BlueGene/L supercomputers. The top-of-the-line installation is planned to be a 65,536 processors system featuring a peak perfo...
Franz Franchetti, Stefan Kral, Juergen Lorenz, Mar...