Sciweavers

811 search results - page 157 / 163
» Modeling and Virtualization for Secure Computing Environment...
Sort
View
114
Voted
DCOSS
2007
Springer
15 years 8 months ago
Localization for Anchoritic Sensor Networks
We introduce a class of anchoritic sensor networks, where communications between sensor nodes are undesirable or infeasible due to, e.g., harsh environments, energy constraints, or...
Yuliy M. Baryshnikov, Jian Tan
GPCE
2007
Springer
15 years 8 months ago
Oz/K: a kernel language for component-based open programming
Programming in an open environment remains challenging because it requires combining modularity, security, concurrency, distribution, and dynamicity. In this paper, we propose an ...
Michael Lienhardt, Alan Schmitt, Jean-Bernard Stef...
DIMVA
2008
15 years 3 months ago
Learning and Classification of Malware Behavior
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major threat to the security of networked systems. The diversity and amount of its variant...
Konrad Rieck, Thorsten Holz, Carsten Willems, Patr...
118
Voted
CONCURRENCY
2006
142views more  CONCURRENCY 2006»
15 years 1 months ago
A Grid service broker for scheduling e-Science applications on global data Grids
: The next generation of scientific experiments and studies, popularly called e-Science, is carried out by large collaborations of researchers distributed around the world engaged ...
Srikumar Venugopal, Rajkumar Buyya, Lyle J. Winton
SIGMETRICS
2011
ACM
191views Hardware» more  SIGMETRICS 2011»
14 years 4 months ago
Stability analysis of QCN: the averaging principle
Data Center Networks have recently caused much excitement in the industry and in the research community. They represent the convergence of networking, storage, computing and virtu...
Mohammad Alizadeh, Abdul Kabbani, Berk Atikoglu, B...