Sciweavers

1558 search results - page 248 / 312
» Scalable work stealing
Sort
View
SAC
2010
ACM
16 years 5 days ago
ESB federation for large-scale SOA
Embracing service-oriented architectures in the context of large systems, such as the Web, rises a set of new and challenging issues: increased size and load in terms of users and...
Françoise Baude, Imen Filali, Fabrice Huet,...
159
Voted
SAC
2009
ACM
16 years 4 days ago
Using geo-spatial session tagging for smart multicast session discovery
IP multicast is increasingly seen as efficient mode of live content distribution in the Internet to significantly large subscriber bases. Despite its numerous benefits over IP u...
Piyush Harsh, Richard Newman
CCS
2009
ACM
16 years 3 days ago
Large-scale malware indexing using function-call graphs
A major challenge of the anti-virus (AV) industry is how to effectively process the huge influx of malware samples they receive every day. One possible solution to this problem i...
Xin Hu, Tzi-cker Chiueh, Kang G. Shin
137
Voted
CCS
2009
ACM
16 years 3 days ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
KDD
2009
ACM
188views Data Mining» more  KDD 2009»
16 years 3 days ago
BGP-lens: patterns and anomalies in internet routing updates
The Border Gateway Protocol (BGP) is one of the fundamental computer communication protocols. Monitoring and mining BGP update messages can directly reveal the health and stabilit...
B. Aditya Prakash, Nicholas Valler, David Andersen...