Sciweavers

8080 search results - page 356 / 1616
» From Computer Networks to Agent Networks
Sort
View
WWW
2008
ACM
16 years 5 months ago
Protecting web services from remote exploit code: a static analysis approach
We propose STILL, a signature-free remote exploit binary code injection attack blocker to protect web servers and web applications. STILL is robust to almost all anti-signature, a...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
CISIS
2008
IEEE
15 years 11 months ago
Inferring the Function of Genes from Synthetic Lethal Mutations
—Techniques for detecting synthetic lethal mutations in double gene deletion experiments are emerging as powerful tool for analysing genes in parallel or overlapping pathways wit...
Oliver Ray, Christopher H. Bryant
DIGITALCITIES
2003
Springer
15 years 10 months ago
Digital Cities and the Opportunities for Mobilizing the Information Society: Case Studies from Portugal
The development of case studies in selected Portuguese cities and regions which have been engaged in “digital city” projects is considered in this paper in a way to discuss mai...
José L. Moutinho, Manuel V. Heitor
ISN
1995
Springer
15 years 8 months ago
VPN on DCE: From Reference Configuration to Implementation
–This paper presents the results of the implementation of a Virtual Private Network telecommunications service prototype and associated management services on a distributed platf...
Jean-Paul Gaspoz, Constant Gbaguidi, Jens Meink&ou...
ATAL
2004
Springer
15 years 10 months ago
Resource Allocation in the Grid Using Reinforcement Learning
One of the main challenges in Grid computing is efficient allocation of resources (CPU-hours, network bandwidth, etc.) to the tasks submitted by users. Due to the lack of centrali...
Aram Galstyan, Karl Czajkowski, Kristina Lerman