Sciweavers

16128 search results - page 3218 / 3226
» Distributed network scheduling
Sort
View
TDSC
2010
218views more  TDSC 2010»
14 years 8 months ago
Secure Data Objects Replication in Data Grid
—Secret sharing and erasure coding-based approaches have been used in distributed storage systems to ensure the confidentiality, integrity, and availability of critical informati...
Manghui Tu, Peng Li, I-Ling Yen, Bhavani M. Thurai...
TPDS
2010
116views more  TPDS 2010»
14 years 8 months ago
FS2You: Peer-Assisted Semipersistent Online Hosting at a Large Scale
—It has been widely acknowledged that online file hosting systems within the “cloud” of the Internet have provided valuable services to end users who wish to share files of a...
Fangming Liu, Ye Sun, Bo Li, Baochun Li, Xinyan Zh...
VR
2010
IEEE
146views Virtual Reality» more  VR 2010»
14 years 8 months ago
Streaming 3D shape deformations in collaborative virtual environment
Collaborative virtual environment has been limited on static or rigid 3D models, due to the difficulties of real-time streaming of large amounts of data that is required to descri...
Ziying Tang, Guodong Rong, Xiaohu Guo, B. Prabhaka...
ACSAC
2010
IEEE
14 years 7 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
ACSAC
2010
IEEE
14 years 7 months ago
Fast and practical instruction-set randomization for commodity systems
Instruction-set randomization (ISR) is a technique based on randomizing the "language" understood by a system to protect it from code-injection attacks. Such attacks wer...
Georgios Portokalidis, Angelos D. Keromytis
« Prev « First page 3218 / 3226 Last » Next »