Sciweavers

830 search results - page 154 / 166
» A hierarchical process execution support for grid computing
Sort
View
EUROSYS
2008
ACM
14 years 8 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
EDUTAINMENT
2007
Springer
14 years 5 months ago
Teaching Structured Development of Virtual Reality Systems Using P-VoT
Learning to build and test virtual reality (VR) systems is difficult due to the many required knowledge (e.g. computer graphics, sound processing, simulation, interaction, etc.) an...
Jinseok Seo, Gerard Jounghyun Kim
ISPA
2005
Springer
14 years 4 months ago
FairOM: Enforcing Proportional Contributions Among Peers in Internet-Scale Distributed Systems
Abstract. The viability of overlay multicasting has been established by prev ious research. However, in order to apply overlay multicast to Internet -scale distributed systems, suc...
Yijun Lu, Hong Jiang, Dan Feng
ICDE
2002
IEEE
149views Database» more  ICDE 2002»
15 years 8 days ago
Indexing Spatio-Temporal Data Warehouses
Spatio-temporal databases store information about the positions of individual objects over time. In many applications however, such as traffic supervision or mobile communication ...
Dimitris Papadias, Yufei Tao, Panos Kalnis, Jun Zh...
ASWSD
2006
Springer
14 years 2 months ago
Generating Sound and Resource-Aware Code from Hybrid Systems Models
Modern real-time embedded systems are complex, distributed, feature-rich applications. Model-based development of real-time embedded systems promises to simplify and accelerate the...
Madhukar Anand, Sebastian Fischmeister, Jesung Kim...