Sciweavers

129 search results - page 12 / 26
» Design and Implementation of a Semantic Peer-to-Peer Network
Sort
View
80
Voted
NDSS
2003
IEEE
15 years 2 months ago
Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools
System call interposition is a powerful method for regulating and monitoring application behavior. In recent years, a wide variety of security tools have been developed that use t...
Tal Garfinkel
PVM
2010
Springer
14 years 8 months ago
Enabling Concurrent Multithreaded MPI Communication on Multicore Petascale Systems
With the ever-increasing numbers of cores per node on HPC systems, applications are increasingly using threads to exploit the shared memory within a node, combined with MPI across ...
Gábor Dózsa, Sameer Kumar, Pavan Bal...
TON
1998
107views more  TON 1998»
14 years 9 months ago
Migrating sockets--end system support for networking with quality of service guarantees
—We present an end system architecture designed to support networking with quality of service (QoS) guarantees. The protocol processing component of the architecture, called Migr...
David K. Y. Yau, Simon S. Lam
ICFP
2005
ACM
15 years 9 months ago
Acute: high-level programming language design for distributed computation
Existing languages provide good support for typeful programming of standalone programs. In a distributed system, however, there may be interaction between multiple instances of ma...
Peter Sewell, James J. Leifer, Keith Wansbrough, F...
IPPS
2006
IEEE
15 years 3 months ago
Network intrusion detection with semantics-aware capability
Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we propose a network intrusion detectio...
Walter J. Scheirer, Mooi Choo Chuah