Sciweavers

5344 search results - page 997 / 1069
» Privacy-Preserving Set Operations
Sort
View
CCS
2003
ACM
14 years 3 months ago
Countering code-injection attacks with instruction-set randomization
We describe a new, general approach for safeguarding systems against any type of code-injection attack. We apply Kerckhoff’s principle, by creating process-specific randomized ...
Gaurav S. Kc, Angelos D. Keromytis, Vassilis Preve...
EAGC
2003
Springer
14 years 3 months ago
Mobile Work Environment for Grid Users
In the paper we aim to describe the project developing the Migrating Desktop infrastructure for the mobile users in a simple way. We also focus on the development testbed, which i...
Miroslaw Kupczyk, Rafal Lichwala, Norbert Meyer, B...
EUROPAR
2003
Springer
14 years 3 months ago
FOBS: A Lightweight Communication Protocol for Grid Computing
The advent of high-performance networks in conjunction with low-cost, powerful computational engines has made possible the development of a new set of technologies termed computat...
Phillip M. Dickens
GECCO
2003
Springer
14 years 3 months ago
A Kernighan-Lin Local Improvement Heuristic That Solves Some Hard Problems in Genetic Algorithms
We present a Kernighan-Lin style local improvement heuristic for genetic algorithms. We analyze the run-time cost of the heuristic. We demonstrate through experiments that the heur...
William A. Greene
ICCS
2003
Springer
14 years 3 months ago
Self-Organizing Hybrid Neurofuzzy Networks
Abstract. We introduce a concept of self-organizing Hybrid Neurofuzzy Networks (HNFN), a hybrid modeling architecture combining neurofuzzy (NF) and polynomial neural networks(PNN)....
Sung-Kwun Oh, Su-Chong Joo, Chang-Won Jeong, Hyun-...