Sciweavers

23557 search results - page 4215 / 4712
» Distributed Computing - Introduction
Sort
View
LCPC
2001
Springer
15 years 9 months ago
Probabilistic Points-to Analysis
Information gathered by the existing pointer analysis techniques can be classified as must aliases or definitely-points-to relationships, which hold for all executions, and may a...
Yuan-Shin Hwang, Peng-Sheng Chen, Jenq Kuen Lee, R...
MDM
2001
Springer
15 years 9 months ago
High Performance Data Broadcasting: A Comprehensive Systems' Perspective
Broadcast scheduling algorithms have received a lot of attention recently, since they are important for supporting mobile/ubiquitous computing. However, a comprehensive system'...
Peter Triantafillou, R. Harpantidou, Michael Pater...
ACSAC
2000
IEEE
15 years 9 months ago
Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness
In this paper we describe a new class of tools for protecting computer systems from security attacks. Their distinguished feature is the principle they are based on. Host or netwo...
Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti
ACSAC
2000
IEEE
15 years 9 months ago
Security Agility in Response to Intrusion Detection
Cooperative frameworks for intrusion detection and response exemplify a key area of today’s computer research: automating defenses against malicious attacks that increasingly ar...
M. Petkac, Lee Badger
128
Voted
APSEC
2000
IEEE
15 years 9 months ago
Platforms for agent-oriented software engineering
of modelling abstractions to map from items in the real-world to objects in the computational domain is oth for the effective implementation of abstract problem solutions and for ...
Mariusz Nowostawski, Geoff Bush, Martin K. Purvis,...
« Prev « First page 4215 / 4712 Last » Next »