Sciweavers

5790 search results - page 131 / 1158
» Distributed programming with distributed authorization
Sort
View
JPDC
2006
87views more  JPDC 2006»
15 years 2 months ago
Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks
Any packet destined to a honeypot machine (that is, a decoy server machine) is most probably an attack packet. We propose honeypot back-propagation, a scheme that traces attack pa...
Sherif M. Khattab, Rami G. Melhem, Daniel Moss&eac...
BC
2008
69views more  BC 2008»
15 years 24 days ago
The scalable mammalian brain: emergent distributions of glia and neurons
Abstract In this paper, we demonstrate that two characteristic properties of mammalian brains emerge when scaling-up modular, cortical structures. Firstly, the glia-toneuron ratio ...
Janneke F. M. Jehee, Jaap M. J. Murre
131
Voted
IFIP
1998
Springer
15 years 6 months ago
Migrating Objects in Electronic Commerce Applications
Electronic Commerce is a field of application that is distributed by nature where different parties share information and work concurrently and cooperatively on objects, potential...
Marko Boger
CLUSTER
2000
IEEE
15 years 6 months ago
SilkRoad: A Multithreaded Runtime System with Software Distributed Shared Memory for SMP Clusters
Multithreaded parallel system with software Distributed Shared Memory (DSM) is an attractive direction in cluster computing. In these systems, distributing workloads and keeping t...
Liang Peng, Weng-Fai Wong, Ming-Dong Feng, Chung-K...
ASPLOS
2010
ACM
15 years 7 months ago
An asymmetric distributed shared memory model for heterogeneous parallel systems
Heterogeneous computing combines general purpose CPUs with accelerators to efficiently execute both sequential control-intensive and data-parallel phases of applications. Existin...
Isaac Gelado, Javier Cabezas, Nacho Navarro, John ...