Sciweavers

1911 search results - page 345 / 383
» A Service Discovery Framework for Service Centric Systems
Sort
View
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
14 years 2 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
ICC
2007
IEEE
150views Communications» more  ICC 2007»
14 years 2 months ago
Utility-based Optimal Rate Allocation for Heterogeneous Wireless Multicast
Abstract— Heterogeneous multicast is an efficient communication scheme especially for multimedia applications running over multihop networks when multicast receivers in the same...
Amr M. Mohamed, Hussein M. Alnuweiri
ACSAC
2006
IEEE
14 years 2 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
AINA
2006
IEEE
14 years 2 months ago
Collaborative Fault Diagnosis in Grids through Automated Tests
Grids have the potential to revolutionize computing by providing ubiquitous, on demand access to computational services and resources. However, grid systems are extremely large, c...
Alexandre Duarte, Francisco Vilar Brasileiro, Walf...
INFOSCALE
2006
ACM
14 years 2 months ago
Indexing and searching tera-scale Grid-Based Digital Libraries
— The University of California, Berkeley and the University of Liverpool in conjunction with the San Diego Supercomputer Center, are developing a framework for GridBased Digital ...
Robert Sanderson, Ray R. Larson