Sciweavers

7891 search results - page 1464 / 1579
» Local Area Networking
Sort
View
IPCCC
2007
IEEE
14 years 5 months ago
SpyCon: Emulating User Activities to Detect Evasive Spyware
The success of any spyware is determined by its ability to evade detection. Although traditional detection methodologies employing signature and anomaly based systems have had rea...
Madhusudhanan Chandrasekaran, Vidyaraman Vidyarama...
IPPS
2007
IEEE
14 years 5 months ago
Task-pushing: a Scalable Parallel GC Marking Algorithm without Synchronization Operations
This paper describes a scalable parallel marking technique for garbage collection that does not employ any synchronization operation. To achieve good scalability, two major design...
Ming Wu, Xiao-Feng Li
IPPS
2007
IEEE
14 years 5 months ago
Online Aggregation over Trees
Consider a distributed network with nodes arranged in a tree, and each node having a local value. We consider the problem of aggregating values (e.g., summing values) from all nod...
C. Greg Plaxton, Mitul Tiwari, Praveen Yalagandula
IPPS
2007
IEEE
14 years 5 months ago
An optimistic checkpointing and selective message logging approach for consistent global checkpoint collection in distributed sy
In this paper, we present an asynchronous consistent global checkpoint collection algorithm which prevents contention for network storage at the file server and hence reduces the...
Qiangfeng Jiang, D. Manivannan
IPPS
2007
IEEE
14 years 5 months ago
Combining Compression, Encryption and Fault-tolerant Coding for Distributed Storage
Storing data in distributed systems aims to offer higher bandwidth and scalability than storing locally. But, a couple of disadvantageous issues must be taken into account such as...
Peter Sobe, Kathrin Peter
« Prev « First page 1464 / 1579 Last » Next »