Sciweavers

8493 search results - page 1456 / 1699
» Implementing a distributed firewall
Sort
View
CF
2007
ACM
15 years 8 months ago
Parallel genomic sequence-search on a massively parallel system
In the life sciences, genomic databases for sequence search have been growing exponentially in size. As a result, faster sequencesearch algorithms to search these databases contin...
Oystein Thorsen, Brian E. Smith, Carlos P. Sosa, K...
ICLP
2010
Springer
15 years 8 months ago
Models for Trustworthy Service and Process Oriented Systems
Abstract. Service and process-oriented systems promise to provide more effective business and work processes and more flexible and adaptable enterprise IT systems. However, the t...
Hugo A. López
117
Voted
ACSAC
2004
IEEE
15 years 8 months ago
Tracing the Root of "Rootable" Processes
In most existing systems, the authorization check for system resource access is based on the user ID of the running processes. Such systems are vulnerable to password stealing/cra...
Amit Purohit, Vishnu Navda, Tzi-cker Chiueh
ATAL
2004
Springer
15 years 8 months ago
IDReAM: Intrusion Detection and Response Executed with Agent Mobility
This paper deals with a new approach to build a completely distributed and decentralized Intrusion Detection and Response System (IDRS) in computer networks. This approach is call...
Noria Foukia
ATAL
2006
Springer
15 years 8 months ago
Hierarchical planning in BDI agent programming languages: a formal approach
This paper provides a general mechanism and a solid theoretical basis for performing planning within Belief-Desire-Intention (BDI) agents. BDI agent systems have emerged as one of...
Sebastian Sardiña, Lavindra de Silva, Lin P...
« Prev « First page 1456 / 1699 Last » Next »