Sciweavers

3831 search results - page 537 / 767
» Dynamic Context Logic
Sort
View
INFOCOM
2005
IEEE
15 years 10 months ago
On the effectiveness of DDoS attacks on statistical filtering
— Distributed Denial of Service (DDoS) attacks pose a serious threat to service availability of the victim network by severely degrading its performance. Recently, there has been...
Qiming Li, Ee-Chien Chang, Mun Choon Chan
IPPS
2005
IEEE
15 years 10 months ago
GUARD: Gossip Used for Autonomous Resource Detection
A growing trend in the development and deployment of grid computing systems is decentralization. Decentralizing these systems helps make them more scalable and robust, but poses s...
Sagnik Nandy, Larry Carter, Jeanne Ferrante
137
Voted
ISCA
2005
IEEE
118views Hardware» more  ISCA 2005»
15 years 10 months ago
Continuous Optimization
This paper presents a hardware-based dynamic optimizer that continuously optimizes an application’s instruction stream. In continuous optimization, dataflow optimizations are p...
Brian Fahs, Todd M. Rafacz, Sanjay J. Patel, Steve...
WCRE
2005
IEEE
15 years 10 months ago
Deobfuscation: Reverse Engineering Obfuscated Code
In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner worki...
Sharath K. Udupa, Saumya K. Debray, Matias Madou
121
Voted
ATAL
2005
Springer
15 years 10 months ago
Agent-based virtual organisations for the Grid
The ability to create reliable and scalable virtual organisations (VOs) on demand in a dynamic, open and competitive environment is one of the major challenges that underlie Grid ...
Jigar Patel, W. T. Luke Teacy, Nicholas R. Jenning...