Sciweavers

5149 search results - page 766 / 1030
» Timed Asynchronous Distributed Systems
Sort
View
CCR
2007
119views more  CCR 2007»
15 years 3 months ago
Exploiting KAD: possible uses and misuses
Peer-to-peer systems have seen a tremendous growth in the last few years and peer-to-peer traffic makes a major fraction of the total traffic seen in the Internet. The dominating ...
Moritz Steiner, Taoufik En-Najjary, Ernst W. Biers...
ICPR
2002
IEEE
16 years 4 months ago
Integrated Event Recognition from Multiple Sources
This paper proposes a system architecture for event recognition that integrates information from multiple sources (e.g., gesture and speech recognition from distributed sensors in...
Hiroaki Kawashima, Takashi Matsuyama
120
Voted
HPCA
2005
IEEE
16 years 4 months ago
Scatter-Add in Data Parallel Architectures
Many important applications exhibit large amounts of data parallelism, and modern computer systems are designed to take advantage of it. While much of the computation in the multi...
Jung Ho Ahn, Mattan Erez, William J. Dally
PDP
2009
IEEE
15 years 10 months ago
PsycoTrace: Virtual and Transparent Monitoring of a Process Self
PsycoTrace is a set of tools to protect a process P from attacks that alter P self as specified by its source code. P self is specified in terms of legal traces of system calls ...
Fabrizio Baiardi, Dario Maggiari, Daniele Sgandurr...
GLOBECOM
2008
IEEE
15 years 10 months ago
Support Vector Machines and Random Forests Modeling for Spam Senders Behavior Analysis
— Unwanted and malicious messages dominate Email traffic and pose a great threat to the utility of email communications. Reputation systems have been getting momentum as the sol...
Yuchun Tang, Sven Krasser, Yuanchen He, Weilai Yan...