Sciweavers

295 search results - page 37 / 59
» An Approach to Trust Management Challenges for Critical Infr...
Sort
View
WEBI
2009
Springer
14 years 2 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
ASPLOS
2004
ACM
14 years 1 months ago
Heat-and-run: leveraging SMT and CMP to manage power density through the operating system
Power density in high-performance processors continues to increase with technology generations as scaling of current, clock speed, and device density outpaces the downscaling of s...
Mohamed A. Gomaa, Michael D. Powell, T. N. Vijayku...
ECBS
2007
IEEE
132views Hardware» more  ECBS 2007»
14 years 2 months ago
The Strategic Impact of Service Oriented Architectures
It has not been since the advent of the client/server architecture break through that an architectural concept has changed the face of enterprise systems so significantly as it h...
Philipp Liegl
ICDCS
2007
IEEE
14 years 2 months ago
Overlay Node Placement: Analysis, Algorithms and Impact on Applications
Abstract— Overlay routing has emerged as a promising approach to improving performance and reliability of Internet paths. To fully realize the potential of overlay routing under ...
Sabyasachi Roy, Himabindu Pucha, Zheng Zhang, Y. C...
SIGMOD
2001
ACM
134views Database» more  SIGMOD 2001»
14 years 7 months ago
Preservation of Digital Data with Self-Validating, Self-Instantiating Knowledge-Based Archives
Digital archives are dedicated to the long-term preservation of electronic information and have the mandate to enable sustained access despite rapid technology changes. Persistent...
Bertram Ludäscher, Richard Marciano, Reagan Moore