Sciweavers

220 search results - page 33 / 44
» A Secure Mechanism for Address Block Allocation and Distribu...
Sort
View
CCS
2005
ACM
14 years 28 days ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
CLUSTER
2006
IEEE
13 years 11 months ago
An Integrated Adaptive Management System for Cluster-based Web Services
The complexity of the cluster-based web service challenges the traditional approaches, which fail to guarantee the reliability and real-time performance required. In this paper, w...
Ying Jiang, Dan Meng, Chao Ren, Jianfeng Zhan
ISLPED
2003
ACM
138views Hardware» more  ISLPED 2003»
14 years 19 days ago
An environmental energy harvesting framework for sensor networks
Energy constrained systems such as sensor networks can increase their usable lifetimes by extracting energy from their environment. However, environmental energy will typically no...
Aman Kansal, Mani B. Srivastava
ISCA
2010
IEEE
236views Hardware» more  ISCA 2010»
14 years 14 days ago
Elastic cooperative caching: an autonomous dynamically adaptive memory hierarchy for chip multiprocessors
Next generation tiled microarchitectures are going to be limited by off-chip misses and by on-chip network usage. Furthermore, these platforms will run an heterogeneous mix of ap...
Enric Herrero, José González, Ramon ...
AIMS
2009
Springer
14 years 1 days ago
Evaluation of Sybil Attacks Protection Schemes in KAD
In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three m...
Thibault Cholez, Isabelle Chrisment, Olivier Festo...