Sciweavers

5548 search results - page 967 / 1110
» Programming a Distributed System Using Shared Objects
Sort
View
WOA
2003
15 years 6 months ago
A Case Study in Role-based Agent Interactions to Perform Administrative Tasks
- Mobile agents are an emerging approach to develop distributed and parallel applications. They also can be used to develop enterprise applications, since they can act as active ne...
Giacomo Cabri, Luca Ferrari, Letizia Leonardi
CORR
2010
Springer
131views Education» more  CORR 2010»
15 years 4 months ago
Detecting Botnets Through Log Correlation
Botnets, which consist of thousands of compromised machines, can cause significant threats to other systems by launching Distributed Denial of Service (DDoS) attacks, keylogging, a...
Yousof Al-Hammadi, Uwe Aickelin
RAID
2010
Springer
15 years 3 months ago
Bait Your Hook: A Novel Detection Technique for Keyloggers
Software keyloggers are a fast growing class of malware often used to harvest confidential information. One of the main reasons for this rapid growth is the possibility for unpriv...
Stefano Ortolani, Cristiano Giuffrida, Bruno Crisp...
CONCUR
2007
Springer
15 years 11 months ago
A Marriage of Rely/Guarantee and Separation Logic
Abstract. In the quest for tractable methods for reasoning about concurrent algorithms both rely/guarantee logic and separation logic have made great advances. They both seek to ta...
Viktor Vafeiadis, Matthew J. Parkinson
SERA
2005
Springer
15 years 10 months ago
MADL: Meta Architecture Description Language
: The techniques of meta-modeling and meta-levels have become a mature concept and have been largely used to solve real problems in programming languages, distributed environments,...
Adel Smeda, Mourad Oussalah, Tahar Khammaci