Sciweavers

339 search results - page 35 / 68
» Design and analysis of a proactive application management sy...
Sort
View
WORM
2003
14 years 11 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
ICDCS
2007
IEEE
15 years 4 months ago
STEP: Sequentiality and Thrashing Detection Based Prefetching to Improve Performance of Networked Storage Servers
State-of-the-art networked storage servers are equipped with increasingly powerful computing capability and large DRAM memory as storage caches. However, their contribution to the...
Shuang Liang, Song Jiang, Xiaodong Zhang
EDOC
2000
IEEE
15 years 2 months ago
Model Checking of Workflow Schemas
Practical experience indicates that the definition of realworld workflow applications is a complex and error-prone process. Existing workflow management systems provide the means,...
Christos T. Karamanolis, Dimitra Giannakopoulou, J...
ANSS
1999
IEEE
15 years 2 months ago
SIM-ENG: A Traffic Simulation Engine
The need for traffic analysis and traffic management applies to a vast range of disciplines. Simulation of traffic may assist in both analysis and management of traffic. In many s...
John M. Creagh
IPPS
2002
IEEE
15 years 2 months ago
MPI/IO on DAFS over VIA: Implementation and Performance Evaluation
In this paper, we describe an implementation of MPI-IO on top of the Direct Access File System (DAFS) standard. The implementation is realized by porting ROMIO on top of DAFS. We ...
Jiesheng Wu, Dhabaleswar K. Panda