Sciweavers

2139 search results - page 201 / 428
» Distributed computing and computer security education
Sort
View
136
Voted
ICDCS
2002
IEEE
15 years 8 months ago
A Fully Distributed Framework for Cost-Sensitive Data Mining
Data mining systems aim to discover patterns and extract useful information from facts recorded in databases. A widely adopted approach is to apply machine learning algorithms to ...
Wei Fan, Haixun Wang, Philip S. Yu, Salvatore J. S...
PODC
2012
ACM
13 years 5 months ago
On the (limited) power of non-equivocation
In recent years, there have been a few proposals to add a small amount of trusted hardware at each replica in a Byzantine fault tolerant system to cut back replication factors. Th...
Allen Clement, Flavio Junqueira, Aniket Kate, Rodr...
IFM
2010
Springer
190views Formal Methods» more  IFM 2010»
15 years 1 months ago
On Model Checking Techniques for Randomized Distributed Systems
Abstract. The automata-based model checking approach for randomized distributed systems relies on an operational interleaving semantics of the system by means of a Markov decision ...
Christel Baier
168
Voted
CORR
2010
Springer
161views Education» more  CORR 2010»
15 years 25 days ago
CrystalGPU: Transparent and Efficient Utilization of GPU Power
General-purpose computing on graphics processing units (GPGPU) has recently gained considerable attention in various domains such as bioinformatics, databases and distributed comp...
Abdullah Gharaibeh, Samer Al-Kiswany, Matei Ripean...
SAC
2009
ACM
15 years 8 months ago
A taxonomy and adversarial model for attacks against network log anonymization
In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have be...
Justin King, Kiran Lakkaraju, Adam J. Slagell