Sciweavers

2560 search results - page 449 / 512
» Securing VO Management
Sort
View
ICANN
2005
Springer
15 years 9 months ago
Detecting Compounded Anomalous SNMP Situations Using Cooperative Unsupervised Pattern Recognition
This research employs unsupervised pattern recognition to approach the thorny issue of detecting anomalous network behavior. It applies a connectionist model to identify user behav...
Emilio Corchado, Álvaro Herrero, José...
IH
2005
Springer
15 years 9 months ago
Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance
Abstract. Information hiding has been studied in many security applications such as authentication, copyright management and digital forensics. In this work, we introduce a new app...
Ashwin Swaminathan, Yinian Mao, Min Wu, Krishnan K...
IPOM
2005
Springer
15 years 9 months ago
Discovering Topologies at Router Level
—Measurement and monitoring of network topologies are essential tasks in current network scenarios. Indeed, due to their utility in planning, management, security, and reliabilit...
Donato Emma, Antonio Pescapè, Giorgio Ventr...
JIT
2005
Springer
134views Database» more  JIT 2005»
15 years 9 months ago
MAGI - Mobile Access to Grid Infrastructure: Bringing the gifts of Grid to Mobile Computing
: Access to Grid services is currently limited to devices having significant computing, network resources etc. such as desktop computers. On the other hand, most of mobile devices ...
Ali Sajjad, Hassan Jameel, Umar Kalim, Young-Koo L...
OOPSLA
2005
Springer
15 years 9 months ago
Fortune teller: improving garbage collection performance in server environment using live objects prediction
Currently, the most adopted criterion to invoke garbage collection is heap space exhaustion. In other words, garbage collection is invoked when the heap space (either the entire s...
Feng Xian, Witawas Srisa-an, Hong Jiang