Sciweavers

2986 search results - page 593 / 598
» Utilizing Heterogeneous Networks in Distributed Parallel Com...
Sort
View
IJAMC
2010
134views more  IJAMC 2010»
14 years 10 months ago
HyperVerse: simulation and testbed reconciled
—When dealing with dynamic large-scale topologies such as those underlying peer-to-peer (P2P) distributed virtual environments (DVE), one inescapably reaches the point where eith...
Jean Botev, Markus Esch, Hermann Schloss, Ingo Sch...
CCS
2003
ACM
15 years 5 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves
ISCA
2009
IEEE
146views Hardware» more  ISCA 2009»
15 years 6 months ago
Multi-execution: multicore caching for data-similar executions
While microprocessor designers turn to multicore architectures to sustain performance expectations, the dramatic increase in parallelism of such architectures will put substantial...
Susmit Biswas, Diana Franklin, Alan Savage, Ryan D...
NSPW
2003
ACM
15 years 5 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
ECLIPSE
2006
ACM
15 years 5 months ago
Lighthouse: coordination through emerging design
Despite the fact that software development is an inherently collaborative activity, a great deal of software development is spent with developers in isolation, working on their ow...
Isabella A. da Silva, Ping Chen, Christopher van d...