Sciweavers

2236 search results - page 289 / 448
» Secure Software Design in Practice
Sort
View
EUROMICRO
2006
IEEE
15 years 4 months ago
Authentication in Stealth Distributed Hash Tables
Most existing DHT algorithms assume that all nodes have equal capabilities. This assumption has previously been shown to be untrue in real deployments, where the heterogeneity of ...
Andrew MacQuire, Andrew Brampton, Idris A. Rai, Ni...
NETGAMES
2006
ACM
15 years 4 months ago
Peer clustering: a hybrid approach to distributed virtual environments
This paper proposes a hybrid architecture for distributed virtual environments, utilizing servers alongside peer-to-peer components. Current research into peer-based systems seeks...
Alvin Chen, Richard R. Muntz
COMPSAC
2004
IEEE
15 years 1 months ago
Services-Oriented Dynamic Reconfiguration Framework for Dependable Distributed Computing
Web services (WS) received significant attention recently because services can be searched, bound, and executed at runtime over the Internet. This paper proposes a dynamic reconfi...
Wei-Tek Tsai, Weiwei Song, Raymond A. Paul, Zhibin...
RAID
2010
Springer
14 years 8 months ago
HyperCheck: A Hardware-Assisted Integrity Monitor
Abstract. Over the past few years, virtualization has been employed to environments ranging from densely populated cloud computing clusters to home desktop computers. Security rese...
Jiang Wang, Angelos Stavrou, Anup K. Ghosh
CHI
2008
ACM
15 years 10 months ago
Location and activity sharing in everyday mobile communication
Frank Bentley We present a study on current, real-world communication of location and activity information based on analyzing context-sharing practices in recorded mobile phone cal...
Frank Bentley, Crysta J. Metcalf