Sciweavers

2200 search results - page 327 / 440
» Hop Integrity in Computer Networks
Sort
View
137
Voted
ICCD
2004
IEEE
97views Hardware» more  ICCD 2004»
16 years 10 days ago
Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution
1 Many computer security threats involve execution of unauthorized foreign code on the victim computer. Viruses, network and email worms, Trojan horses, backdoor programs used in ...
A. Murat Fiskiran, Ruby B. Lee
120
Voted
ESCIENCE
2007
IEEE
15 years 9 months ago
A SLA-Oriented Management of Containers for Hosting Stateful Web Services
Service-Oriented Architectures provide integration of interoperability for independent and loosely coupled services. Web services and the associated new standards such as WSRF are...
Christoph Reich, Kris Bubendorfer, Matthias Banhol...
134
Voted
IPPS
2006
IEEE
15 years 9 months ago
Towards a universal client for grid monitoring systems: design and implementation of the Ovid browser
In this paper, we present the design and implementation of Ovid, a browser for Grid-related information. The key goal of Ovid is to support the seamless navigation of users in the...
Marios D. Dikaiakos, A. Artemiou, George Tsouloupa...
DAC
2006
ACM
15 years 9 months ago
A fast on-chip decoupling capacitance budgeting algorithm using macromodeling and linear programming
We propose a novel and efficient charge-based decoupling capacitance budgeting algorithm. Our method uses the macromodeling technique and effective radius of decoupling capacitan...
Min Zhao, Rajendran Panda, Savithri Sundareswaran,...
TIP
2008
261views more  TIP 2008»
15 years 3 months ago
CTex - An Adaptive Unsupervised Segmentation Algorithm Based on Color-Texture Coherence
Abstract--This paper presents the development of an unsupervised image segmentation framework (referred to as CTex) that is based on the adaptive inclusion of color and texture in ...
Dana Elena Ilea, Paul F. Whelan