Sciweavers

3424 search results - page 232 / 685
» Building Diverse Computer Systems
Sort
View
ISPA
2005
Springer
14 years 1 months ago
A Generic Approach to Make Structured Peer-to-Peer Systems Topology-Aware
Abstract. With the help of distributed hash tables, the structured peerto-peer system has a short routing path and good extensibility. However, the mismatch between the overlay and...
Tongqing Qiu, Fan Wu, Guihai Chen
HUMAN
2003
Springer
14 years 1 months ago
DOC: A Distributed Object Caching System for Information Infrastructure
Object caching is a desirable feature to improve the both scalability and performance of distributed application systems for information infrastructure, the information management ...
Taehee Lee, Junho Shim, Sang-goo Lee
FM
1997
Springer
159views Formal Methods» more  FM 1997»
14 years 12 days ago
Term Rewrite Systems to Derive Set Boolean Operations on 2D Objects
Abstract Set boolean operations between 2-dlmensional geometric objects are crucial in computational geometry and deserve rigorous treatments. We build up a simple and convergent s...
David Cazier, Jean-François Dufourd
DIMVA
2010
13 years 9 months ago
Conqueror: Tamper-Proof Code Execution on Legacy Systems
We present Conqueror, a software-based attestation scheme for tamper-proof code execution on untrusted legacy systems. Beside providing load-time attestation of a piece of code, Co...
Lorenzo Martignoni, Roberto Paleari, Danilo Brusch...
ICONIP
2004
13 years 9 months ago
Hybrid Feature Selection for Modeling Intrusion Detection Systems
Most of the current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (...
Srilatha Chebrolu, Ajith Abraham, Johnson P. Thoma...