Sciweavers

31686 search results - page 107 / 6338
» Resource typing in Guru
Sort
View
DSN
2005
IEEE
14 years 2 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
ISCC
2005
IEEE
14 years 2 months ago
A Label Space Reduction Algorithm for P2MP LSPs Using Asymmetric Tunnels
- Traffic Engineering objective is to optimize network resource utilization. Although several works have been published about minimizing network resource utilization, few works hav...
Fernando Solano, Ramón Fabregat, Yezid Dono...
FPL
2005
Springer
98views Hardware» more  FPL 2005»
14 years 2 months ago
Using DSP Blocks For ROM Replacement: A Novel Synthesis Flow
This paper describes a method based on polynomial approximation for transferring ROM resources used in FPGA designs to multiplication and addition operations. The technique can be...
Gareth W. Morris, George A. Constantinides, Peter ...
SSDBM
2003
IEEE
160views Database» more  SSDBM 2003»
14 years 2 months ago
The Virtual Data Grid: A New Model and Architecture for Data-Intensive Collaboration
It is now common to encounter communities engaged in the collaborative analysis and transformation of large quantities of data over extended time periods. We argue that these comm...
Ian T. Foster
GRID
2003
Springer
14 years 2 months ago
Policy and Enforcement in Virtual Organizations
Arguably, the main goal of Grid Computing is to facilitate the creation of Virtual Organizations (VOs); however, to date, not enough attention has been placed on the policies and ...
Glenn S. Wasson, Marty Humphrey