Sciweavers

441 search results - page 82 / 89
» Vulnerabilities and Threats in Distributed Systems
Sort
View
EMSOFT
2005
Springer
15 years 5 months ago
Compiler-guided register reliability improvement against soft errors
With the scaling of technology, transient errors caused by external particle strikes have become a critical challenge for microprocessor design. As embedded processors are widely ...
Jun Yan, Wei Zhang
ATAL
2005
Springer
15 years 5 months ago
Reciprocal resource sharing in P2P environments
Peer-to-peer (P2P) systems enable users to share resources in a networked environment without worrying about issues such as scalability and load balancing. Unlike exchange of good...
Dipyaman Banerjee, Sabyasachi Saha, Sandip Sen, Pr...
HPCA
2006
IEEE
16 years 7 hour ago
InfoShield: a security architecture for protecting information usage in memory
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information c...
Guofei Gu, Hsien-Hsin S. Lee, Joshua B. Fryman, Ju...
SIGCOMM
2009
ACM
15 years 6 months ago
A programmable overlay router for service provider innovation
The threat of commoditization poses a real challenge for service providers. While the end-to-end principle is often paraphrased as “dumb network, smart end-systems”, the origi...
Bruce S. Davie, Jan Medved
RAID
1999
Springer
15 years 3 months ago
Towards trapping wily intruders in the large
The rapid increase in network bandwidth from mega bits per second to giga bits per second and potentially to tera bits per second, is making it increasingly difficult to carry out...
Glenn Mansfield