Sciweavers

1291 search results - page 175 / 259
» Intrusion Detection for Distributed Applications
Sort
View
HPCA
2000
IEEE
14 years 1 months ago
Modified LRU Policies for Improving Second-Level Cache Behavior
Main memory accesses continue to be a significant bottleneck for applications whose working sets do not fit in second-level caches. With the trend of greater associativity in seco...
Wayne A. Wong, Jean-Loup Baer
PAM
2010
Springer
14 years 3 months ago
MOR: Monitoring and Measurements through the Onion Router
Abstract. A free and easy to use distributed monitoring and measurement platform would be valuable in several applications: monitoring network or server infrastructures, performing...
Demetres Antoniades, Evangelos P. Markatos, Consta...
CCS
2003
ACM
14 years 2 months ago
PPay: micropayments for peer-to-peer systems
Emerging economic P2P applications share the common need for an efficient, secure payment mechanism. In this paper, we present PPay, a micropayment system that exploits unique cha...
Beverly Yang, Hector Garcia-Molina
CIS
2007
Springer
13 years 10 months ago
Security Assurance for Dynamic Role Mapping in a Multi-Domain Environment
Multi-domain application environments where distributed domains interoperate with each other are becoming a reality in Internet-based enterprise applications. The secure interoper...
Cuihua Zuo, Ruixuan Li, Hongmu Han, Zhengding Lu
KI
2005
Springer
14 years 2 months ago
A Probabilistic Multimodal Sensor Aggregation Scheme Applied for a Mobile Robot
Dealing with methods of human-robot interaction and using a real mobile robot, stable methods for people detection and tracking are fundamental features of such a system and requir...
Erik Schaffernicht, Christian Martin, Andrea Schei...