Sciweavers

2674 search results - page 225 / 535
» Implementation issues for an interactive evolutionary comput...
Sort
View
MIDDLEWARE
2007
Springer
15 years 10 months ago
Securing peer-to-peer media streaming systems from selfish and malicious behavior
We present a flexible framework for throttling attackers in peerto-peer media streaming systems. In such systems, selfish nodes (e.g., free riders) and malicious nodes (e.g., DoS ...
William Conner, Klara Nahrstedt
IPPS
2002
IEEE
15 years 9 months ago
A Comparative Study of Parallel and Distributed Java Projects for Heterogeneous Systems
During the last few years, the concepts of cluster computing and heterogeneous networked systems have received increasing interest. The popularity of using Java for developing par...
Jameela Al-Jaroodi, Nader Mohamed, Hong Jiang, Dav...
EUC
2008
Springer
15 years 5 months ago
A Context Management System for Supporting Context-Aware Applications
This paper presents a context management system for supporting context-aware applications in a smart home. In a ubiquitous computing environment context changes dynamically and th...
Eunhoe Kim, Jaeyoung Choi
CORR
2010
Springer
109views Education» more  CORR 2010»
15 years 4 months ago
Experimenting with Innate Immunity
libtissue is a software system for implementing and testing AIS algorithms on real-world computer security problems. AIS algorithms are implemented as a collection of cells, antig...
Jamie Twycross, Uwe Aickelin

Book
372views
17 years 10 days ago
EJB Design Patterns
"EJB Design Patterns goes beyond high-level design pattern descriptions into critical EJB-specific implementation issues, illustrated with source code implementations. The boo...
Floyd Marinescu