Sciweavers

16702 search results - page 22 / 3341
» Server operating systems
Sort
View
83
Voted
LISA
2001
14 years 11 months ago
ScanSSH: Scanning the Internet for SSH Servers
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Niels Provos, Peter Honeyman
GECCO
2006
Springer
159views Optimization» more  GECCO 2006»
15 years 1 months ago
Smart crossover operator with multiple parents for a Pittsburgh learning classifier system
This paper proposes a new smart crossover operator for a Pittsburgh Learning Classifier System. This operator, unlike other recent LCS approaches of smart recombination, does not ...
Jaume Bacardit, Natalio Krasnogor
OSDI
1994
ACM
14 years 11 months ago
Opportunistic Log: Efficient Installation Reads in a Reliable Storage Server
In a distributed storage system, client caches managed on the basis of small granularity objects can provide better memory utilization then page-based caches. However, object serv...
James O'Toole, Liuba Shrira
CORR
2011
Springer
198views Education» more  CORR 2011»
14 years 4 months ago
Quire: Lightweight Provenance for Smart Phone Operating Systems
Smartphone apps often run with full privileges to access the network and sensitive local resources, making it difficult for remote systems to have any trust in the provenance of ...
Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anh...
IISWC
2008
IEEE
15 years 4 months ago
Temporal streams in commercial server applications
Commercial server applications remain memory bound on modern multiprocessor systems because of their large data footprints, frequent sharing, complex non-strided access patterns, ...
Thomas F. Wenisch, Michael Ferdman, Anastasia Aila...