Sciweavers

40 search results - page 7 / 8
» SCS: Securing the Future of Simulation
Sort
View
IPTPS
2004
Springer
14 years 1 months ago
P6P: A Peer-to-Peer Approach to Internet Infrastructure
Abstract— P6P is a new, incrementally deployable networking infrastructure that resolves the growing tensions between the Internet routing infrastructure and the end sites of the...
Lidong Zhou, Robbert van Renesse
ISCAPDCS
2001
13 years 9 months ago
Tolerating Transient Faults through an Instruction Reissue Mechanism
In this paper, we propose a fault-tolerant mechanism for microprocessors, which detects transient faults and recovers from them. There are two driving force to investigate fault-t...
Toshinori Sato, Itsujiro Arita
PE
2006
Springer
114views Optimization» more  PE 2006»
13 years 7 months ago
On the performance of Internet worm scanning strategies
In recent years, fast spreading worms, such as Code Red, Slammer, Blaster and Sasser, have become one of the major threats to the security of the Internet. In order to defend agai...
Cliff Changchun Zou, Donald F. Towsley, Weibo Gong
ICPIA
1992
13 years 11 months ago
Intelligent Pattern Recognition and Applications
:: This talk deals with fundamental aspects of Intelligent Pattern Recognition (IPR) and applications. It basically includes the following: Overview of 3D Biometric Technology and ...
Patrick Shen-Pei Wang
MSWIM
2006
ACM
14 years 1 months ago
Ticket-based mobile commerce system and its implementation
Security is a critical issue in mobile commerce, especially in mobile database systems since mobile environments are dynamic and traditional protection mechanisms do not work very...
Hua Wang, Xiaodi Huang, Goutham Reddy Dodda