Sciweavers

119 search results - page 22 / 24
» Predicate Control for Active Debugging of Distributed Progra...
Sort
View
CORR
2010
Springer
151views Education» more  CORR 2010»
13 years 7 months ago
Behavioural Correlation for Detecting P2P Bots
In the past few years, IRC bots, malicious programs which are remotely controlled by the attacker through IRC servers, have become a major threat to the Internet and users. These ...
Yousof Al-Hammadi, Uwe Aickelin
ISSTA
2004
ACM
14 years 25 days ago
Verifying process models built using parameterized state machines
Software process and workflow languages are increasingly used to define loosely-coupled systems of systems. These languages focus on coordination issues such as data flow and c...
Barbara Staudt Lerner
AUSAI
2003
Springer
14 years 19 days ago
Efficiently Mining Frequent Patterns from Dense Datasets Using a Cluster of Computers
Efficient mining of frequent patterns from large databases has been an active area of research since it is the most expensive step in association rules mining. In this paper, we pr...
Yudho Giri Sucahyo, Raj P. Gopalan, Amit Rudra
IPPS
2005
IEEE
14 years 1 months ago
Connection-less TCP
TCP is an important protocol in high-performance computing. It is used extensively in graphics programs and file systems and it is often the protocol used for the cluster control...
Patricia Gilfeather, Arthur B. Maccabe
DATE
2006
IEEE
78views Hardware» more  DATE 2006»
14 years 1 months ago
Wireless sensor networks and beyond
—Wireless Sensor Networks provide opportunities even outside their usual application domain of environmental monitoring. In this paper we present a case study on the use of Wirel...
Paul J. M. Havinga