Sciweavers

503 search results - page 74 / 101
» A survey on bio-inspired networking
Sort
View
IEEESCC
2006
IEEE
14 years 1 months ago
Memory Servers: A Scope of SOA for High-End Computing
The expanding gap between microprocessor and disk performance has initiated new techniques of providing memory as a service in high-end computing (HEC). Although the processor and...
Surendra Byna, Xian-He Sun, Ryan Nakhoul
FMCO
2005
Springer
173views Formal Methods» more  FMCO 2005»
14 years 1 months ago
Cluster-Based LTL Model Checking of Large Systems
Abstract. In recent years a bundle of parallel and distributed algorithms for verification of finite state systems has appeared. We survey distributed-memory enumerative LTL mode...
Jiri Barnat, Lubos Brim, Ivana Cerná
IWIA
2003
IEEE
14 years 27 days ago
Intrusion Detection Testing and Benchmarking Methodologies
— The ad-hoc methodology that is prevalent in today’s testing and evaluation of network intrusion detection algorithms and systems makes it difficult to compare different algor...
Nicholas Athanasiades, Randal Abler, John G. Levin...
WPES
2003
ACM
14 years 26 days ago
Leveraging the "Multi" in secure multi-party computation
Secure Multi-Party Computation enables parties with private data to collaboratively compute a global function of their private data, without revealing that data. The increase in s...
Jaideep Vaidya, Chris Clifton
HICSS
2002
IEEE
123views Biometrics» more  HICSS 2002»
14 years 17 days ago
Toward a Value Framework for Online Learning Systems
Many universities and private corporations are investing significant capital in online learning initiatives. Willingness on the part of the student to take part in online learning...
Yair Levy, Kenneth E. Murphy