Sciweavers

2494 search results - page 85 / 499
» Dependable Distributed Computing Using Free Databases
Sort
View
RAID
2010
Springer
13 years 6 months ago
Bait Your Hook: A Novel Detection Technique for Keyloggers
Software keyloggers are a fast growing class of malware often used to harvest confidential information. One of the main reasons for this rapid growth is the possibility for unpriv...
Stefano Ortolani, Cristiano Giuffrida, Bruno Crisp...
IPPS
2005
IEEE
14 years 1 months ago
Distributed Data Streams Indexing using Content-Based Routing Paradigm
In recent years, we have seen a dramatic increase in the use of data-centric distributed systems such as global grid infrastructures, sensor networks, network monitoring, and vari...
Ahmet Bulut, Ambuj K. Singh, Roman Vitenberg
ICFP
2010
ACM
13 years 8 months ago
Security-typed programming within dependently typed programming
Several recent security-typed programming languages, such as Aura, PCML5, and Fine, allow programmers to express and enforce access control and information flow policies. Most of ...
Jamie Morgenstern, Daniel R. Licata
VISUALIZATION
2005
IEEE
14 years 1 months ago
View-Dependent Rendering of Multiresolution Texture-Atlases
Real-time rendering of massively textured 3D scenes usually involves two major problems: Large numbers of texture switches are a well-known performance bottleneck and the set of s...
Henrik Buchholz, Jürgen Döllner
MIDDLEWARE
2005
Springer
14 years 1 months ago
Scrivener: Providing Incentives in Cooperative Content Distribution Systems
Cooperative peer-to-peer (p2p) applications are designed to share the resources of participating computers for the common good of all users. However, users do not necessarily have ...
Animesh Nandi, Tsuen-Wan Ngan, Atul Singh, Peter D...