Sciweavers

7124 search results - page 1260 / 1425
» Programming Languages and Operating Systems
Sort
View
PPOPP
2009
ACM
16 years 3 months ago
Atomic quake: using transactional memory in an interactive multiplayer game server
Transactional Memory (TM) is being studied widely as a new technique for synchronizing concurrent accesses to shared memory data structures for use in multi-core systems. Much of ...
Adrián Cristal, Eduard Ayguadé, Fera...
130
Voted
ICN
2009
Springer
15 years 9 months ago
CoUniverse: Framework for Building Self-Organizing Collaborative Environments Using Extreme-Bandwidth Media Applications
Using internet for media-based real-time collaboration has become widespread activity. In this paper, we present a framework called CoUniverse, designed for building realtime user...
Milos Liska, Petr Holub
DSN
2007
IEEE
15 years 8 months ago
An Architectural Approach to Preventing Code Injection Attacks
Code injection attacks, despite being well researched, continue to be a problem today. Modern architectural solutions such as the NX-bit and PaX have been useful in limiting the a...
Ryan Riley, Xuxian Jiang, Dongyan Xu
BIOSURVEILLANCE
2007
Springer
15 years 8 months ago
Global Foot-and-Mouth Disease Surveillance Using BioPortal
Abstract. The paper presents a description of the FMD BioPortal biosurveillance system (http://fmd.ucdavis.edu/bioportal/) that is currently operating to capture, analyze, and diss...
Mark Thurmond, Andrés Perez, Chunju Tseng, ...
IEEEARES
2006
IEEE
15 years 8 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
« Prev « First page 1260 / 1425 Last » Next »