Sciweavers

2503 search results - page 189 / 501
» Building Computer Network Attacks
Sort
View
125
Voted
ISSA
2004
15 years 3 months ago
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Marek Zielinski
FGCS
2000
143views more  FGCS 2000»
15 years 1 months ago
A data intensive distributed computing architecture for "Grid" applications
Modern scientific computing involves organizing, moving, visualizing, and analyzing massive amounts of data from around the world, as well as employing large-scale computation. The...
Brian Tierney, William E. Johnston, Jason Lee, Mar...
WMASH
2003
ACM
15 years 7 months ago
Challenge: ubiquitous location-aware computing and the "place lab" initiative
To be widely adopted, location-aware computing must be as effortless, familiar and rewarding as web search tools like Google. We envisage the global scale Place Lab, consisting of...
Bill N. Schilit, Anthony LaMarca, Gaetano Borriell...
EUC
2007
Springer
15 years 3 months ago
U-Interactive: A Middleware for Ubiquitous Fashionable Computer to Interact with the Ubiquitous Environment by Gestures
In this paper we present a system, called U-interactive, that provides spontaneous interactions between human and surrounding objects in heterogenous ubiquitous computing environme...
Gyudong Shim, SangKwon Moon, Yong Song, JaeSub Kim...
ICDCS
2008
IEEE
15 years 8 months ago
stdchk: A Checkpoint Storage System for Desktop Grid Computing
— Checkpointing is an indispensable technique to provide fault tolerance for long-running high-throughput applications like those running on desktop grids. This paper argues that...
Samer Al-Kiswany, Matei Ripeanu, Sudharshan S. Vaz...