Sciweavers

2139 search results - page 245 / 428
» Distributed computing and computer security education
Sort
View
109
Voted
CLUSTER
2001
IEEE
15 years 7 months ago
NPACI Rocks: Tools and Techniques for Easily Deploying Manageable Linux Clusters
High-performance computing clusters (commodity hardware with low-latency, high-bandwidth interconnects) based on Linux, are rapidly becoming the dominant computing platform for a ...
Philip M. Papadopoulos, Mason J. Katz, Greg Bruno
APPT
2005
Springer
15 years 9 months ago
Grid Developing Environment in CGSP System
Abstract. Grid computing is becoming a mainstream technology for multiinstitutional distributed resources sharing and system integration. Normally, the programmer's productivi...
Weimin Zheng, Lisen Mu, Qing Wang, Yongwei Wu
159
Voted
GI
2004
Springer
15 years 8 months ago
A Low-Cost Solution for Frequent Symmetric Key Exchange in Ad-hoc Networks
: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...
Markus Volkmer, Sebastian Wallner
127
Voted
IWSEC
2007
Springer
15 years 9 months ago
Run-Time Randomization to Mitigate Tampering
The problem of defending software against tampering by a malicious host is not expected to be solved soon. Rather than trying to defend against the first attack, randomization tri...
Bertrand Anckaert, Mariusz H. Jakubowski, Ramarath...
114
Voted
CSFW
1996
IEEE
15 years 7 months ago
An Immunological Approach to Change Detection: Theoretical Results
: This paper examines some of the theoretical foundations of the distributable change detection method introduced by Forrest et al. in [10], including fundamental bounds on some of...
Patrik D'haeseleer