Sciweavers

1291 search results - page 187 / 259
» Intrusion Detection for Distributed Applications
Sort
View
IPPS
1999
IEEE
14 years 1 months ago
Reducing System Overheads in Home-based Software DSMs
Software DSM systems su er from the high communication and coherence-induced overheads that limit performance. This paper introduces our e orts in reducing system overheads of a h...
Weiwu Hu, Weisong Shi, Zhimin Tang
PARLE
1994
14 years 25 days ago
Using Reference Counters in Update-Based Coherent Memory
Abstract. As the disparity between processor and memory speed continues to widen, the exploitation of locality of reference in shared-memory multiprocessors becomes an increasingly...
Evangelos P. Markatos, Catherine E. Chronaki
ICASSP
2009
IEEE
14 years 19 days ago
Principal component analysis in decomposable Gaussian graphical models
We consider principal component analysis (PCA) in decomposable Gaussian graphical models. We exploit the prior information in these models in order to distribute its computation. ...
Ami Wiesel, Alfred O. Hero III
CCGRID
2004
IEEE
14 years 15 days ago
A reputation-based trust management system for P2P networks
The open and anonymous nature of a P2P network makes it an ideal medium for attackers to spread malicious content. In this paper, we propose a reputation-based trust management sy...
Ali Aydin Selçuk, Ersin Uzun, Mark Resat Pa...
ECBS
2004
IEEE
153views Hardware» more  ECBS 2004»
14 years 15 days ago
Architectural Description with Integrated Data Consistency Models
The focus of typical architectural models is the description of large systems. Even though these systems are usually distributed, aspects of distributed systems are only addressed...
Peter Tabeling