Sciweavers

1158 search results - page 22 / 232
» An approach to the transparent management instrumentation of...
Sort
View
NSPW
2003
ACM
15 years 2 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
CN
2010
94views more  CN 2010»
14 years 9 months ago
A market-based approach to managing the risk of peer-to-peer transactions
Ptrim is a purely decentralised application for performing peer-to-peer transactions. Instead of relying on a typical trust/reputation management approach, Ptrim allows its users t...
Stephanos Androutsellis-Theotokis, Diomidis Spinel...
CORR
2010
Springer
92views Education» more  CORR 2010»
14 years 9 months ago
Applying Constraint Solving to the Management of Distributed Applications
Abstract. We present our approach for deploying and managing distributed component-based applications. A Desired State Description (DSD), written in a high-level declarative langua...
Andrew McCarthy, Alan Dearle, Graham N. C. Kirby
CLUSTER
2007
IEEE
15 years 3 months ago
Non-collective parallel I/O for global address space programming models
— Achieving high performance for out-of-core applications typically involves explicit management of the movement of data between the disk and the physical memory. We are developi...
Sriram Krishnamoorthy, Juan Piernas, Vinod Tippara...
ESM
2000
14 years 10 months ago
Multi-agent architecture for distributed simulation: Teaching application for industrial management
We are located in the context of the simulation of complex industrial systems, which are distributed in geographical, decisional and informational terms. This paper is divided int...
Stéphane Galland, Frédéric Gr...