Sciweavers

675 search results - page 118 / 135
» Evolution of a Software Component - Experiences with a Netwo...
Sort
View
119
Voted
SEC
2008
15 years 5 months ago
Collaborative architecture for malware detection and analysis
The constant increase of malware threats clearly shows that the present countermeasures are not sufficient especially because most actions are put in place only when infections hav...
Michele Colajanni, Daniele Gozzi, Mirco Marchetti
147
Voted
ICDCSW
2007
IEEE
15 years 3 months ago
A Middleware Support for Agent-Based Application Mobility in Pervasive Environments
—Application mobility is an efficient way to mask uneven conditioning and reduce users’ distractions in pervasive environments. However, since mobility brings more dynamism and...
Yu Zhou, Jiannong Cao, Vaskar Raychoudhury, Joanna...
CIKM
2010
Springer
15 years 2 months ago
Brown dwarf: a P2P data-warehousing system
In this demonstration we present the Brown Dwarf, a distributed system designed to efficiently store, query and update multidimensional data. Deployed on any number of commodity ...
Katerina Doka, Dimitrios Tsoumakos, Nectarios Kozi...
TSE
2010
230views more  TSE 2010»
14 years 10 months ago
Vulnerability Discovery with Attack Injection
The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being...
João Antunes, Nuno Ferreira Neves, Miguel C...
ICDCS
2011
IEEE
14 years 3 months ago
Smart Redundancy for Distributed Computation
Many distributed software systems allow participation by large numbers of untrusted, potentially faulty components on an open network. As faults are inevitable in this setting, th...
Yuriy Brun, George Edwards, Jae Young Bang, Nenad ...