Sciweavers

1767 search results - page 178 / 354
» Open Source Ecology
Sort
View
JNCA
2007
75views more  JNCA 2007»
15 years 4 months ago
Stateful DDoS attacks and targeted filtering
The goal of a DDoS (distributed denial of service) attack is to completely tie up certain resources so that legitimate users are not able to access a service. It has long been an ...
Shigang Chen, Yong Tang, Wenliang Du
SAC
2008
ACM
15 years 3 months ago
Data sharing vs. message passing: synergy or incompatibility?: an implementation-driven case study
One reasonable categorization of coordination models is into data sharing or message passing, based on whether the information necessary to coordination is persistently stored and...
Matteo Ceriotti, Amy L. Murphy, Gian Pietro Picco
IWPSE
2010
IEEE
15 years 2 months ago
Evolutional analysis of licenses in FOSS
FOSS (Free and Open Source System) is repeatedly modied and reused by other FOSS or proprietary software systems. They are released to others under specic licenses whose terms and...
Yuki Manabe, Yasuhiro Hayase, Katsuro Inoue
EUROSYS
2011
ACM
14 years 8 months ago
Symbolic crosschecking of floating-point and SIMD code
We present an effective technique for crosschecking an IEEE 754 floating-point program and its SIMD-vectorized version, implemented in KLEE-FP, an extension to the KLEE symbolic ...
Peter Collingbourne, Cristian Cadar, Paul H. J. Ke...
EDBT
2012
ACM
254views Database» more  EDBT 2012»
13 years 7 months ago
Inside "Big Data management": ogres, onions, or parfaits?
In this paper we review the history of systems for managing “Big Data” as well as today’s activities and architectures from the (perhaps biased) perspective of three “data...
Vinayak R. Borkar, Michael J. Carey, Chen Li