Sciweavers

3341 search results - page 491 / 669
» A Communication Virtual Machine
Sort
View
ICICS
2004
Springer
15 years 7 months ago
Hydan: Hiding Information in Program Binaries
We present a scheme to steganographically embed information in x86 program binaries. We define sets of functionally-equivalent instructions, and use a key-derived selection proces...
Rakan El-Khalil, Angelos D. Keromytis
INFOCOM
2002
IEEE
15 years 7 months ago
Fast PDA Synchronization Using Characteristic Polynomial Interpolation
—Modern Personal Digital Assistant (PDA) architectures often utilize a wholesale data transfer protocol known as “slow sync” for synchronizing PDAs with Personal Computers (P...
Ari Trachtenberg, David Starobinski, Sachin Agarwa...
ICPPW
2000
IEEE
15 years 6 months ago
Scheduling Multiple Multicast for Heterogeneous Network of Workstations with Non-Blocking Message-Passing
This paper proposes efficient algorithms for implementing multicast in heterogeneous workstation/PC clusters. Multicast is an important operation in many scientific and industri...
Shih-Hsien Yeh, Jan-Jan Wu, Pangfeng Liu
INFOCOM
1995
IEEE
15 years 6 months ago
Automatic Alarm Correlation for Fault Identification
In communication networks, a large number of alarms exist to signal any abnormal behavior of the network. As network faults typically result in a number of alarms, correlating the...
Isabelle Rouvellou, George W. Hart
FTCS
1996
110views more  FTCS 1996»
15 years 3 months ago
Experimental Assessment of Parallel Systems
In the research reported in this paper, transient faults were injected in the nodes and in the communication subsystem (by using software fault injection) of a commercial parallel...
João Gabriel Silva, Joao Carreira, Henrique...