Sciweavers

13717 search results - page 2529 / 2744
» Control Systems
Sort
View
CORR
2010
Springer
151views Education» more  CORR 2010»
15 years 3 months ago
Behavioural Correlation for Detecting P2P Bots
In the past few years, IRC bots, malicious programs which are remotely controlled by the attacker through IRC servers, have become a major threat to the Internet and users. These ...
Yousof Al-Hammadi, Uwe Aickelin
124
Voted
CONCURRENCY
2008
102views more  CONCURRENCY 2008»
15 years 3 months ago
Dynamic data replication in LCG 2008
To provide performant access to data from high energy physics experiments such as the Large Hadron Collider (LHC), controlled replication of files among grid sites is required. Dy...
Caitriana Nicholson, David G. Cameron, A. T. Doyle...
104
Voted
CORR
2010
Springer
130views Education» more  CORR 2010»
15 years 3 months ago
Towards Adaptable and Adaptive Policy-Free Middleware
We believe that to fully support adaptive distributed applications, middleware must itself be adaptable, adaptive and policy-free. In this paper we present a new language-independ...
Alan Dearle, Graham N. C. Kirby, Stuart J. Norcros...
CORR
2010
Springer
74views Education» more  CORR 2010»
15 years 3 months ago
RAFDA: Middleware Supporting the Separation of Application Logic from Distribution Policy
Middleware technologies, often limit the way in which object classes may be used in distributed applications due to the fixed distribution policies imposed by the Middleware system...
Alan Dearle, Scott M. Walker, Stuart J. Norcross, ...
CORR
2008
Springer
98views Education» more  CORR 2008»
15 years 3 months ago
Information Acquisition and Exploitation in Multichannel Wireless Networks
A wireless system with multiple channels is considered, where each channel has several transmission states. A user learns about the instantaneous state of an available channel by ...
Sudipto Guha, Kamesh Munagala, Saswati Sarkar
« Prev « First page 2529 / 2744 Last » Next »