Sciweavers

13 search results - page 3 / 3
» cj 2002
Sort
View
CJ
2002
70views more  CJ 2002»
13 years 6 months ago
Formal Methods for Assuring Security of Protocols
l examination of the underlying assumptions, abstractions, and possible actions. Consequently, assuring that a system behaves securely is virtually impossible without the use of ri...
Susan Older, Shiu-Kai Chin
CJ
2002
67views more  CJ 2002»
13 years 6 months ago
Using Bloom Filters to Speed-up Name Lookup in Distributed Systems
Bloom filters make use of a "probabilistic" hash-coding method to reduce the amount of space required to store a hash set. A Bloom filter offers a trade-off between its ...
Mark C. Little, Santosh K. Shrivastava, Neil A. Sp...
CJ
2002
122views more  CJ 2002»
13 years 6 months ago
Java for On-line Distributed Monitoring of Heterogeneous Systems and Services
monitoring indicators at different levels of abstraction. At the application level, it instruments the Java Virtual Machine (JVM) to notify several different types of events trigge...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...