We study computer virology from an abstract point of view. Viruses and worms are self-replicating programs, whose constructions are essentially based on Kleene's second recurs...
In previous work we have presented the ZENTURIO experiment management system for performance and parameter studies of parallel and distributed applications on cluster and Grid arc...
In this paper, we discuss new analytical methods for computing Value-at-Risk (VaR)andacreditexposureproï¬le.UsingaMonteCarlosimulationapproachasabenchmark, we ï¬nd that the analy...
Ben De Prisco, Ian Iscoe, Alexander Y. Kreinin, Ah...
Defending against large, distributed Denial-of-Service attacks is challenging, with large changes to the network core or to end-hosts often suggested. To make matters worse, spooï...
The construction of composite Web Services from service fragments requires semantic descriptions of service offers and service requests. We propose the use of dependencies as a mo...