Sciweavers

632 search results - page 46 / 127
» Performance Analysis of a Cluster File System
Sort
View
AUSFORENSICS
2004
15 years 1 months ago
An Analysis and Comparison of Clustered Password Crackers
Password policies alone do not stand a chance of securing computer systems which rely on the use of secretbased, password authentication methods. The enforcement of "strong&q...
Christian Frichot
GLOBECOM
2010
IEEE
14 years 9 months ago
Skip Finite Automaton: A Content Scanning Engine to Secure Enterprise Networks
Abstract--Today's file sharing networks are creating potential security problems to enterprise networks, i.e., the leakage of confidential documents. In order to prevent such ...
Junchen Jiang, Yi Tang, Bin Liu, Yang Xu, Xiaofei ...
SC
1995
ACM
15 years 3 months ago
Parallel Implementations of the Power System Transient Stability Problem on Clusters of Workstations
Power system transient stability analysis computes the response of the rapidly changing electrical components of a power system to a sequence of large disturbances followed by ope...
Monika ten Bruggencate, Suresh Chalasani
ASPLOS
2008
ACM
15 years 1 months ago
SoftSig: software-exposed hardware signatures for code analysis and optimization
Many code analysis techniques for optimization, debugging, or parallelization need to perform runtime disambiguation of sets of addresses. Such operations can be supported efficie...
James Tuck, Wonsun Ahn, Luis Ceze, Josep Torrellas
CHI
2005
ACM
16 years 7 days ago
Patterns of media use in an activity-centric collaborative environment
This paper describes a new collaboration technology that is based on the support of lightweight, informally structured, opportunistic activities featuring heterogeneous threads of...
David R. Millen, Michael J. Muller, Werner Geyer, ...