Sciweavers

2503 search results - page 263 / 501
» Building Computer Network Attacks
Sort
View
HPDC
1999
IEEE
15 years 6 months ago
A Network-Aware Distributed Storage Cache for Data Intensive Environments
Modern scientific computing involves organizing, moving, visualizing, and analyzing massive amounts of data at multiple sites around the world. The technologies, the middleware se...
Brian Tierney, Jason Lee, Brian Crowley, Mason Hol...
PAM
2009
Springer
15 years 8 months ago
Monitoring the Bittorrent Monitors: A Bird's Eye View
Abstract. Detecting clients with deviant behavior in the Bittorrent network is a challenging task that has not received the deserved attention. Typically, this question is seen as ...
Georgos Siganos, Josep M. Pujol, Pablo Rodriguez
NSDI
2008
15 years 4 months ago
Securing Distributed Systems with Information Flow Control
Recent operating systems [12, 21, 26] have shown that decentralized information flow control (DIFC) can secure applications built from mostly untrusted code. This paper extends DI...
Nickolai Zeldovich, Silas Boyd-Wickizer, David Maz...
SDM
2012
SIAM
252views Data Mining» more  SDM 2012»
13 years 4 months ago
Learning from Heterogeneous Sources via Gradient Boosting Consensus
Multiple data sources containing different types of features may be available for a given task. For instance, users’ profiles can be used to build recommendation systems. In a...
Xiaoxiao Shi, Jean-François Paiement, David...
ICDCS
2009
IEEE
15 years 8 months ago
Logoot: A Scalable Optimistic Replication Algorithm for Collaborative Editing on P2P Networks
Massive collaborative editing becomes a reality through leading projects such as Wikipedia. This massive collaboration is currently supported with a costly central service. In ord...
Stéphane Weiss, Pascal Urso, Pascal Molli