Sciweavers

4029 search results - page 663 / 806
» Experience with Software Watermarking
Sort
View
CLEF
2010
Springer
14 years 11 months ago
Building Strategies, a Year Later
Abstract. After participating in last year's CLEF IP (2009) evaluation benchmark, our scores were rather low. The CLEF IP 2010 PAC task enabled us to correct some experiments ...
Wouter Alink, Roberto Cornacchia, Arjen P. de Vrie...
EUROPAR
2010
Springer
14 years 11 months ago
Transactional Mutex Locks
Mutual exclusion locks limit concurrency but offer low latency. Software transactional memory (STM) typically has higher latency, but scales well. In this paper we propose transac...
Luke Dalessandro, David Dice, Michael L. Scott, Ni...
CSREASAM
2009
14 years 11 months ago
A Stochastic Model of the Damage Propagation in Database Systems
Security defense tools like firewalls and antivirus softwares are not sufficient to defend against dynamic threats to database systems. Successful attacks could not only seriously ...
Hai Wang, Su Yan
DAIS
2009
14 years 11 months ago
A Reflective Middleware to Support Peer-to-Peer Overlay Adaptation
As peer-to-peer systems are evolving from simplistic application specific overlays to middleware platforms hosting a range of potential applications it has become evident that incr...
Gareth Tyson, Paul Grace, Andreas Mauthe, Gordon S...
HPDC
2010
IEEE
14 years 11 months ago
Early observations on the performance of Windows Azure
A significant open issue in cloud computing is performance. Few, if any, cloud providers or technologies offer quantitative performance guarantees. Regardless of the potential adv...
Zach Hill, Jie Li, Ming Mao, Arkaitz Ruiz-Alvarez,...