Sciweavers

2902 search results - page 517 / 581
» Software Product Lines
Sort
View
HICSS
2007
IEEE
118views Biometrics» more  HICSS 2007»
15 years 6 months ago
Is the Open Way a Better Way? Digital Forensics Using Open Source Tools
The subject of digital forensics can be quite challenging. Digital forensics is in its infancy and teaching digital forensics includes the techniques as well as the tools that ass...
Dan Manson, Anna Carlin, Steve Ramos, Alain Gyger,...
IPPS
2007
IEEE
15 years 6 months ago
Base Operating System Provisioning and Bringup for a Commercial Supercomputer
Commercial Scale-Out is a new research project at IBM Research. Its main goal is to investigate and develop technologies for the use of large scale parallelism in commercial appli...
David Daly, Jong Hyuk Choi, José E. Moreira...
IPPS
2007
IEEE
15 years 6 months ago
The Design and Implementation of Checkpoint/Restart Process Fault Tolerance for Open MPI
To be able to fully exploit ever larger computing platforms, modern HPC applications and system software must be able to tolerate inevitable faults. Historically, MPI implementati...
Joshua Hursey, Jeffrey M. Squyres, Timothy Mattox,...
PRDC
2007
IEEE
15 years 6 months ago
Implementation of Highly Available OSPF Router on ATCA
This paper proposes a Highly-Available Open Shortest Path First (HA-OSPF) router which consists of two OSPF router modules-active and standby-to support a highavailability network...
Chia-Tai Tsai, Rong-Hong Jan, Chien Chen, Chia-Yua...
SECURWARE
2007
IEEE
15 years 6 months ago
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments
A Man-in-the-Middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing...
Jorge Belenguer, Carlos Miguel Tavares Calafate