Sciweavers

5740 search results - page 1067 / 1148
» Dynamic Distributed BackJumping
Sort
View
CCS
2009
ACM
14 years 3 months ago
Privacy-preserving genomic computation through program specialization
In this paper, we present a new approach to performing important classes of genomic computations (e.g., search for homologous genes) that makes a significant step towards privacy...
Rui Wang, XiaoFeng Wang, Zhou Li, Haixu Tang, Mich...
ICS
2009
Tsinghua U.
14 years 3 months ago
Combining thread level speculation helper threads and runahead execution
With the current trend toward multicore architectures, improved execution performance can no longer be obtained via traditional single-thread instruction level parallelism (ILP), ...
Polychronis Xekalakis, Nikolas Ioannou, Marcelo Ci...
ICAC
2009
IEEE
14 years 3 months ago
Resilient workload manager: taming bursty workload of scaling internet applications
In data centers hosting scaling Internet applications, operators face the tradeoff dilemma between resource efficiency and Quality of Service (QoS), and the root cause lies in wo...
Hui Zhang 0002, Guofei Jiang, Kenji Yoshihira, Hai...
ICC
2009
IEEE
150views Communications» more  ICC 2009»
14 years 3 months ago
Modeling Human Behavior for Defense Against Flash-Crowd Attacks
—Flash-crowd attacks are the most vicious form of distributed denial of service (DDoS). They flood the victim with service requests generated from numerous bots. Attack requests...
Georgios Oikonomou, Jelena Mirkovic
INFOCOM
2009
IEEE
14 years 3 months ago
Defending Mobile Phones from Proximity Malware
—As mobile phones increasingly become the target of propagating malware, their use of direct pair-wise communication mechanisms, such as Bluetooth and WiFi, pose considerable cha...
Gjergji Zyba, Geoffrey M. Voelker, Michael Liljens...
« Prev « First page 1067 / 1148 Last » Next »