Sciweavers

1448 search results - page 223 / 290
» Deadlock Detection in Distributed Systems
Sort
View
CEEMAS
2007
Springer
15 years 10 months ago
Agent-Based Network Protection Against Malicious Code
This paper presents an agent-based approach to Network Intrusion Prevention on corporate networks, emphasizing the protection from fast-spreading mobile malicious code outbreaks (e...
Martin Rehák, Michal Pechoucek, Jan Tozicka...
ICWE
2007
Springer
15 years 10 months ago
Modeling Data-intensive Rich Internet Applications with Server Push Support
Abstract. Rich Internet applications (RIAs) enable novel usage scenarios by overcoming the traditional paradigms of Web interaction. Conventional Web applications can be seen as re...
Giovanni Toffetti Carughi
CLUSTER
2006
IEEE
15 years 10 months ago
Heterogeneous Parallel Computing in Remote Sensing Applications: Current Trends and Future Perspectives
Heterogeneous networks of computers have rapidly become a very promising commodity computing solution, expected to play a major role in the design of high performance computing sy...
Antonio J. Plaza
156
Voted
EUC
2005
Springer
15 years 9 months ago
Ubiquitous Computing: Challenges in Flexible Data Aggregation
Abstract. A dramatic increase of event monitoring capabilities by wireless sensors requires new, more sophisticated, event correlation over time and space. This new paradigm implie...
Eiko Yoneki, Jean Bacon
118
Voted
WDAG
2004
Springer
113views Algorithms» more  WDAG 2004»
15 years 9 months ago
Bounded Version Vectors
Abstract. Version vectors play a central role in update tracking under optimistic distributed systems, allowing the detection of obsolete or inconsistent versions of replicated dat...
José Bacelar Almeida, Paulo Sérgio A...