Sciweavers

2747 search results - page 358 / 550
» Network externalities in software systems
Sort
View
CN
2007
137views more  CN 2007»
13 years 10 months ago
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
Spyros Antonatos, Periklis Akritidis, Evangelos P....
MONET
2010
170views more  MONET 2010»
13 years 8 months ago
A Framework for Engineering Pervasive Applications Applied to Intra-vehicular Sensor Network Applications
The vehicle sector is one of the most exciting application areas for wireless ad hoc networks and pervasive computing technologies. Vehicles are constantly being equipped with more...
Antonio Coronato, Giuseppe De Pietro, Jong Hyuk Pa...
TSMC
2010
13 years 4 months ago
On Robust Stability of Stochastic Genetic Regulatory Networks With Time Delays: A Delay Fractioning Approach
Robust stability serves as an important regulation mechanism in system biology and synthetic biology. In this paper, the robust stability analysis problem is investigated for a cla...
Yao Wang, Zidong Wang, Jinling Liang
AINA
2007
IEEE
14 years 4 months ago
Pervasive Service Composition in the Home Network
The home environment becomes ready to host distributed devices dynamically adapting to service availability and reacting to user location and user activity. Sensors, high definiti...
André Bottaro, Anne Gérodolle, Phili...
PACT
1997
Springer
14 years 2 months ago
Viability of Multithreading on Networks of Workstations
Abstract. Recent trend in high-performance computing focuses on networks of workstations (NOWs) as a way ofrealizing cost-effective parallel machines. This has been due to the avai...
Hantak Kwak, Ben Lee, Ali R. Hurson