Sciweavers

2028 search results - page 296 / 406
» Highly Predictive Blacklisting
Sort
View
IH
2004
Springer
14 years 1 months ago
An Asymmetric Security Mechanism for Navigation Signals
Abstract. Existing navigation services, such as GPS, offer no signalintegrity (anti-spoof) protection for the general public, especially not with systems for remote attestation of...
Markus G. Kuhn
IWQOS
2004
Springer
14 years 1 months ago
Triage: performance isolation and differentiation for storage systems
Abstract— Ensuring performance isolation and differentiation among workloads that share a storage infrastructure is a basic requirement in consolidated data centers. Existing man...
Magnus Karlsson, Christos T. Karamanolis, Xiaoyun ...
VLDB
2004
ACM
98views Database» more  VLDB 2004»
14 years 1 months ago
Top-k Query Evaluation with Probabilistic Guarantees
Top-k queries based on ranking elements of multidimensional datasets are a fundamental building block for many kinds of information discovery. The best known general-purpose algor...
Martin Theobald, Gerhard Weikum, Ralf Schenkel
CCGRID
2003
IEEE
14 years 1 months ago
GridFlow: Workflow Management for Grid Computing
Grid computing is becoming a mainstream technology for large-scale distributed resource sharing and system integration. Workflow management is emerging as one of the most importan...
Junwei Cao, Stephen A. Jarvis, Subhash Saini, Grah...
DISCEX
2003
IEEE
14 years 1 months ago
Achieving Principled Assuredly Trustworthy Composable Systems and Networks
Huge challenges exist with systems and networks that must dependably satisfy stringent requirements for security, reliability, and other attributes of trustworthiness. Drawing on ...
Peter G. Neumann