Sciweavers

2601 search results - page 472 / 521
» Quantum Network Coding
Sort
View
HAIS
2010
Springer
14 years 12 days ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
GI
2009
Springer
14 years 7 days ago
Massively-Parallel Simulation of Biochemical Systems
: Understanding biological evolution prompts for a detailed understanding of the realized phenotype. Biochemical and gene regulatory dynamics are a cornerstone for the physiology o...
Jens Ackermann, Paul Baecher, Thorsten Franzel, Mi...
IWSOS
2009
Springer
14 years 5 days ago
Self-organized Data Redundancy Management for Peer-to-Peer Storage Systems
In peer-to-peer storage systems, peers can freely join and leave the system at any time. Ensuring high data availability in such an environment is a challenging task. In this paper...
Yaser Houri, Manfred Jobmann, Thomas Fuhrmann
MA
2001
Springer
175views Communications» more  MA 2001»
14 years 1 days ago
Evaluating the Security of Three Java-Based Mobile Agent Systems
Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supporting applications whose components can move between different execution enviro...
Sebastian Fischmeister, Giovanni Vigna, Richard A....
SAIG
2001
Springer
14 years 1 days ago
MetaKlaim: Meta-programming for Global Computing
Most foundational models for global computing have focused on the spatial dimension of computations, however global computing requires also new ways of thinking about the temporal ...
Gian Luigi Ferrari, Eugenio Moggi, Rosario Puglies...