Sciweavers

162 search results - page 15 / 33
» A Rule System for Network-Centric Operation in Massively Dis...
Sort
View
HOTI
2005
IEEE
14 years 1 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood
SPAA
2006
ACM
14 years 1 months ago
Towards a scalable and robust DHT
The problem of scalable and robust distributed data storage has recently attracted a lot of attention. A common approach in the area of peer-to-peer systems has been to use a dist...
Baruch Awerbuch, Christian Scheideler
FIRSTMONDAY
2010
125views more  FIRSTMONDAY 2010»
13 years 4 months ago
The social environment model: Small heroes and the evolution of human society
Traditional "realistic" theories of social action, whether based on the individual gain heuristics of capitalism or the collective class struggles of communism, cannot e...
Brian Whitworth, Alex P. Whitworth
FUIN
2008
93views more  FUIN 2008»
13 years 7 months ago
Logic-based Conflict Detection for Distributed Policies
Policies are used to describe rules that are employed to modify (often distributed) system behaviour at runtime. Typically policies are created by many different people and there a...
Carlo Montangero, Stephan Reiff-Marganiec, Laura S...
CONCUR
2003
Springer
14 years 23 days ago
Priority Rewrite Systems for OSOS Process Languages
We propose an algorithm for generating a Priority Rewrite System (PRS) for an arbitrary process language in the OSOS format such that rewriting of process terms is sound for bisim...
Irek Ulidowski