Traditional Intrusion Detection Systems (IDSs) mostly work off-line, without any direct runtime interaction or coordination with the applications (and with other IDSs) that they a...
Joseph P. Loyall, Partha Pratim Pal, Richard E. Sc...
This paper describes a setup using a surround screen environment (Extended Virtual Environment EVE dome) that we used to explore group interaction in real and virtual space. We ha...
Quantum algorithms for factoring and finding discrete logarithms have previously been generalized to finding hidden subgroups of finite Abelian groups. This paper explores the ...
MPICH2 provides a layered architecture for implementing MPI-2. In this paper, we provide a new design for implementing MPI-2 over InfiniBand by extending the MPICH2 ADI3 layer. Ou...
Peer-to-peer systems have the desirable property that the amount of resources available in the system increase as demand for services increases due to growth of the system. We exp...