Sciweavers

1348 search results - page 99 / 270
» Keynote Address I
Sort
View
IPCCC
2007
IEEE
14 years 3 months ago
SpyCon: Emulating User Activities to Detect Evasive Spyware
The success of any spyware is determined by its ability to evade detection. Although traditional detection methodologies employing signature and anomaly based systems have had rea...
Madhusudhanan Chandrasekaran, Vidyaraman Vidyarama...
DSN
2006
IEEE
14 years 3 months ago
Automatic Instruction-Level Software-Only Recovery
As chip densities and clock rates increase, processors are becoming more susceptible to transient faults that can affect program correctness. Computer architects have typically ad...
Jonathan Chang, George A. Reis, David I. August
GLOBECOM
2006
IEEE
14 years 3 months ago
Toposemantic Network Clustering
— We study the problem of building an optimal network-layer clustering hierarchy, where the optimality can be defined using three potentially conflicting metrics: state, delay ...
Leonid B. Poutievski, Kenneth L. Calvert, Jim Grif...
ICNS
2006
IEEE
14 years 3 months ago
Evaluating Global Optimisation for Data Grids using Replica Location Services
As efforts to develop grid computing solutions gather pace, considerable attention has been directed at defining and addressing technical requirements associated with computationa...
Ernest Sithole, Gerard P. Parr, Sally I. McClean, ...
ACMSE
2006
ACM
14 years 2 months ago
Performance evaluation of the reactor pattern using the OMNeT++ simulator
The design of large-scale, distributed, performance-sensitive systems presents numerous challenges due to their networkcentric nature and stringent quality of service (QoS) requir...
Arundhati Kogekar, Aniruddha S. Gokhale