Sciweavers

1548 search results - page 269 / 310
» Computational Approaches to Sentence Completion
Sort
View
NDSS
2008
IEEE
14 years 3 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
DIGRA
2005
Springer
14 years 2 months ago
socio-ec(h)o: Ambient Intelligence and Gameplay
This paper describes the preliminary research of an ambient intelligent system known as socioec(h)o. socio-ec(h)o explores the design and implementation of an ambient intelligent ...
Ron Wakkary, Marek Hatala, Robb Lovell, Milena Dro...
WDAG
2001
Springer
131views Algorithms» more  WDAG 2001»
14 years 1 months ago
The Complexity of Synchronous Iterative Do-All with Crashes
Abstract. The ability to cooperate on common tasks in a distributed setting is key to solving a broad range of computation problems ranging from distributed search such as SETI to ...
Chryssis Georgiou, Alexander Russell, Alexander A....
PODC
1999
ACM
14 years 29 days ago
Liveness-Preserving Simulation Relations
We present a new approach for reasoning about liveness properties of distributed systems, represented as automata. Our approach is based on simulation relations, and requires reas...
Paul C. Attie
CLUSTER
2004
IEEE
14 years 12 days ago
Rolls: modifying a standard system installer to support user-customizable cluster frontend appliances
The Rocks toolkit [9], [7], [10] uses a graph-based framework to describe the configuration of all node types (termed appliances) that make up a complete cluster. With hundreds of...
Greg Bruno, Mason J. Katz, Federico D. Sacerdoti, ...