Sciweavers

4311 search results - page 629 / 863
» Code Generation for Distributed Systems
Sort
View
90
Voted
HPDC
1999
IEEE
15 years 4 months ago
Process Hijacking
Process checkpointing is a basic mechanism required for providing High Throughput Computing service on distributively owned resources. We present a new process checkpoint and migr...
Victor C. Zandy, Barton P. Miller, Miron Livny
95
Voted
CORR
2010
Springer
123views Education» more  CORR 2010»
15 years 2 days ago
A Peer-to-Peer Middleware Framework for Resilient Persistent Programming
The persistent programming systems of the 1980s offered a programming model that integrated computation and long-term storage. In these systems, reliable applications could be eng...
Alan Dearle, Graham N. C. Kirby, Stuart J. Norcros...
USENIX
2001
15 years 1 months ago
MEF: Malicious Email Filter - A UNIX Mail Filter That Detects Malicious Windows Executables
We present Malicious Email Filter, MEF, a freely distributed malicious binary filter incorporated into Procmail that can detect malicious Windows attachments by integrating with a...
Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Man...
116
Voted
CORR
2011
Springer
139views Education» more  CORR 2011»
14 years 4 months ago
Volatility of Power Grids under Real-Time Pricing
—The paper proposes a framework for modeling and analysis of the dynamics of supply, demand, and clearing prices in power system with real-time retail pricing and information asy...
Mardavij Roozbehani, Munther Dahleh, Sanjoy K. Mit...
103
Voted
WSC
1998
15 years 1 months ago
Communication Mission-type Orders to Virtual Commanders
This paper discusses issues in modeling C4I and cognitive processes in next generation simulations and applications to Force XXI command and control. We propose a modification to ...
Martin S. Kleiner, Scott A. Carey, Joseph E. Beach