Sciweavers

4889 search results - page 80 / 978
» A Refactoring Approach to Parallelism
Sort
View
112
Voted
IPPS
2007
IEEE
15 years 9 months ago
An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection
Since current internet threats contain not only malicious codes like Trojan or worms, but also spyware and adware which do not have explicit illegal content, it is necessary to hav...
Like Zhang, Gregory B. White
140
Voted
IPPS
2005
IEEE
15 years 8 months ago
Some Issues in Solving the Anomaly Detection Problem using Immunological Approach
Results of an experimental study of an anomaly detection system based on the paradigm of artificial immune systems (AISs) are presented. Network traffic data are mapped into ant...
Franciszek Seredynski, Pascal Bouvry
133
Voted
HPDC
2002
IEEE
15 years 7 months ago
A Peer-to-Peer Approach to Resource Location in Grid Environments
Resource location (or discovery) is a fundamental service for resource-sharing environments: given desired resource attributes, the service returns locations of matching resources....
Adriana Iamnitchi, Ian T. Foster, Daniel Nurmi
104
Voted
CONCUR
1999
Springer
15 years 7 months ago
Testing Concurrent Systems: A Formal Approach
This paper discusses the use of formal methods in testing of concurrent systems. It is argued that formal methods and testing can be mutually profitable and useful. A framework fo...
Jan Tretmans
102
Voted
EUROPAR
1997
Springer
15 years 7 months ago
A Relational Approach to the Compilation of Sparse Matrix Programs
Abstract. We present a relational algebra based framework for compiling e cient sparse matrix code from dense DO-ANY loops and a speci cation of the representation of the sparse ma...
Vladimir Kotlyar, Keshav Pingali, Paul Stodghill