Sciweavers

4196 search results - page 632 / 840
» Supporting the development of network programs
Sort
View
179
Voted
TMC
2010
179views more  TMC 2010»
15 years 2 months ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera
AINA
2009
IEEE
15 years 10 months ago
Predictive Simulation of HPC Applications
The architectures which support modern supercomputing machinery are as diverse today, as at any point during the last twenty years. The variety of processor core arrangements, thr...
Simon D. Hammond, J. A. Smith, Gihan R. Mudalige, ...
126
Voted
BMCBI
2008
165views more  BMCBI 2008»
15 years 4 months ago
SWS: accessing SRS sites contents through Web Services
Background: Web Services and Workflow Management Systems can support creation and deployment of network systems, able to automate data analysis and retrieval processes in biomedic...
Paolo Romano 0001, Domenico Marra
TISSEC
2010
119views more  TISSEC 2010»
14 years 10 months ago
Storage-Based Intrusion Detection
Storage-based intrusion detection allows storage systems to transparently watch for suspicious activity. Storage systems are well-positioned to spot several common intruder action...
Adam G. Pennington, John Linwood Griffin, John S. ...
SIGMOD
2006
ACM
145views Database» more  SIGMOD 2006»
16 years 4 months ago
Automatic client-server partitioning of data-driven web applications
Current application development tools provide completely different programming models for the application server (e.g., Java and J2EE) and the client web browser (e.g., JavaScript...
Nicholas Gerner, Fan Yang 0002, Alan J. Demers, Jo...