Sciweavers

459 search results - page 66 / 92
» Malware Models for Network and Service Management
Sort
View
IM
2007
14 years 11 months ago
Hierarchically Federated Registration and Lookup within the perfSONAR Framework
A widely-distributed network monitoring system requires a scalable discovery mechanism. The “Lookup Service” component of the perfSONAR framework is able to manage component r...
Jason Zurawski, Jeff W. Boote, Eric L. Boyd, Macie...
PERCOM
2009
ACM
15 years 10 months ago
RationalExposure: a Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
In pervasive computing environments, personal information is expressed in digital forms to a great extent. Daily activities and personal preferences may be easily associated with p...
Feng Zhu, Wei Zhu
HPDC
2010
IEEE
14 years 10 months ago
Efficient querying of distributed provenance stores
Current projects that automate the collection of provenance information use a centralized architecture for managing the resulting metadata - that is, provenance is gathered at rem...
Ashish Gehani, Minyoung Kim, Tanu Malik
83
Voted
EUROSSC
2006
Springer
15 years 1 months ago
Toward Wide Area Interaction with Ubiquitous Computing Environments
Despite many years of ubiquitous computing (ubicomp) middleware research, deployment of such systems has not been widespread. We suggest this is in part because we lack a shared mo...
Michael Blackstock, Rodger Lea, Charles Krasic
WSC
1997
14 years 11 months ago
A Hybrid Tool for the Performance Evaluation of NUMA Architectures
We present a system for describing and solving closed queuing network models of the memory access performance of NUMA architectures. The system consists of a model description lan...
James Westall, Robert Geist