Sciweavers

1753 search results - page 259 / 351
» IRON file systems
Sort
View
DIMVA
2010
15 years 3 days ago
dAnubis - Dynamic Device Driver Analysis Based on Virtual Machine Introspection
Abstract. In the escalating arms race between malicious code and security tools designed to analyze it, detect it or mitigate its impact, malicious code running inside the operatin...
Matthias Neugschwandtner, Christian Platzer, Paolo...
COMCOM
2006
151views more  COMCOM 2006»
14 years 12 months ago
Characteristic analysis of internet traffic from the perspective of flows
The necessity of network traffic monitoring and analysis is growing dramatically with increasing network usage demands from individual users as well as business communities. Most ...
Myung-Sup Kim, Young J. Won, James W. Hong
JCM
2006
112views more  JCM 2006»
14 years 12 months ago
A Peer-to-Peer Cooperation Enhancement Scheme and its Performance Analysis
The performance of peer-to-peer systems depends on the level of cooperation of the system's participants. While most existing peer-to-peer architectures have assumed that user...
Wei-Cherng Liao, Fragkiskos Papadopoulos, Konstant...
JNW
2006
120views more  JNW 2006»
14 years 12 months ago
An EMST Based Look-up Protocol for Peer to Peer Networks
-- Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems a...
Tarun Bansal, Pankaj Ghanshani
TKDE
1998
142views more  TKDE 1998»
14 years 11 months ago
Performance Analysis of Three Text-Join Algorithms
—When a multidatabase system contains textual database systems (i.e., information retrieval systems), queries against the global schema of the multidatabase system may contain a ...
Weiyi Meng, Clement T. Yu, Wei Wang 0010, Naphtali...