Sciweavers

1884 search results - page 49 / 377
» Abstraction from Counters: An Application on Real-Time Syste...
Sort
View
INFOCOM
2006
IEEE
14 years 2 months ago
DDoS-Resilient Scheduling to Counter Application Layer Attacks Under Imperfect Detection
— Countering Distributed Denial of Service (DDoS) attacks is becoming ever more challenging with the vast resources and techniques increasingly available to attackers. In this pa...
Supranamaya Ranjan, Ram Swaminathan, Mustafa Uysal...
PARLE
1994
14 years 29 days ago
Using Reference Counters in Update-Based Coherent Memory
Abstract. As the disparity between processor and memory speed continues to widen, the exploitation of locality of reference in shared-memory multiprocessors becomes an increasingly...
Evangelos P. Markatos, Catherine E. Chronaki
ICCS
2003
Springer
14 years 2 months ago
Virtual Telemetry for Dynamic Data-Driven Application Simulations
Abstract. We describe a virtual telemetry system that allows us to devise and augment dynamic data-driven application simulations (DDDAS). Virtual telemetry has the advantage that ...
Craig C. Douglas, Yalchin Efendiev, Richard E. Ewi...
IJISEC
2006
119views more  IJISEC 2006»
13 years 9 months ago
A monitoring system for detecting repeated packets with applications to computer worms
Abstract We present a monitoring system which detects repeated packets in network traffic, and has applications including detecting computer worms. It uses Bloom filters with count...
Paul C. van Oorschot, Jean-Marc Robert, Miguel Var...
ICRA
1993
IEEE
126views Robotics» more  ICRA 1993»
14 years 1 months ago
Toward a New Intelligent Reactive Controller for Autonomous Mobile Robots
A survey of blackboard robotics applications shows the improvements of blackboard models used in telerobotics and autonomous robots from the use of sequential blackboard in the ro...
Jean-Yves Tigli, Michel Occello, M.-C. Thomas