Sciweavers

5056 search results - page 921 / 1012
» Network Coding Theory
Sort
View
127
Voted
ESSOS
2010
Springer
15 years 11 months ago
Idea: Opcode-Sequence-Based Malware Detection
Malware is every malicious code that has the potential to harm any computer or network. The amount of malware is increasing faster every year and poses a serious security threat. H...
Igor Santos, Felix Brezo, Javier Nieves, Yoseba K....
CISIS
2010
IEEE
15 years 9 months ago
Computational Grid as an Appropriate Infrastructure for Ultra Large Scale Software Intensive Systems
—Ultra large scale (ULS) systems are future software intensive systems that have billions of lines of code, composed of heterogeneous, changing, inconsistent and independent elem...
Babak Rezaei Rad, Fereidoon Shams Aliee
122
Voted
CCS
2009
ACM
15 years 9 months ago
MYSEA: the monterey security architecture
Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while pr...
Cynthia E. Irvine, Thuy D. Nguyen, David J. Shiffl...
155
Voted
HPDC
2009
IEEE
15 years 9 months ago
Interconnect agnostic checkpoint/restart in open MPI
Long running High Performance Computing (HPC) applications at scale must be able to tolerate inevitable faults if they are to harness current and future HPC systems. Message Passi...
Joshua Hursey, Timothy Mattox, Andrew Lumsdaine
124
Voted
ICC
2009
IEEE
200views Communications» more  ICC 2009»
15 years 9 months ago
Fast Distributed Multi-Cell Scheduling with Delayed Limited-Capacity Backhaul Links
— Both fast scheduling and spatial signal processing have proven to be capacity-increasing methods in wireless communication systems. However, when applied in the downlink of a c...
Ralf Bendlin, Yih-Fang Huang, Michel T. Ivrlac, Jo...