Sciweavers

2200 search results - page 107 / 440
» Hop Integrity in Computer Networks
Sort
View
ISF
2008
114views more  ISF 2008»
13 years 9 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
BICOB
2010
Springer
13 years 9 months ago
Integrative Biomarker Discovery for Breast Cancer Metastasis from Gene Expression and Protein Interaction Data Using Error-toler
Biomarker discovery for complex diseases is a challenging problem. Most of the existing approaches identify individual genes as disease markers, thereby missing the interactions a...
Rohit Gupta, Smita Agrawal, Navneet Rao, Ze Tian, ...
JAVA
2001
Springer
14 years 1 months ago
A scalable, robust network for parallel computing
CX, a network-based computational exchange, is presented. The system’s design integrates variations of ideas from other researchers, such as work stealing, non-blocking tasks, e...
Peter R. Cappello, Dimitros Mourloukos
IPPS
2003
IEEE
14 years 2 months ago
Integration of a CAN-Based Connection-Oriented Communication Model into Real-Time CORBA
The Real-Time CORBA and minimumCORBA specifications are important steps towards defining standard-based middleware which can satisfy real-time requirements in an embedded system...
Stefan Lankes, Andreas Jabs, Thomas Bemmerl
SIGOPSE
1998
ACM
14 years 1 months ago
Distributed virtual machines: a system architecture for network computing
Modern virtual machines, such as Java and Inferno, are emerging as network computing s. While these virtual machines provide higher-level abstractions and more sophisticated servi...
Emin Gün Sirer, Robert Grimm, Brian N. Bersha...