Sciweavers

1558 search results - page 14 / 312
» Scalable work stealing
Sort
View
NSDI
2008
14 years 4 days ago
Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware
While the web provides information and services that enrich our lives in many ways, it has also become the primary vehicle for delivering malware. Once infected with web-based mal...
Michalis Polychronakis, Niels Provos
ATAL
2008
Springer
13 years 11 months ago
A new perspective to the keepaway soccer: the takers
Keepaway is a sub-problem of RoboCup Soccer Simulator in which 'the keepers' try to maintain the possession of the ball, while 'the takers' try to steal the ba...
Atil Iscen, Umut Erogul
JISE
2002
165views more  JISE 2002»
13 years 9 months ago
Locality-Preserving Dynamic Load Balancing for Data-Parallel Applications on Distributed-Memory Multiprocessors
Load balancing and data locality are the two most important factors in the performance of parallel programs on distributed-memory multiprocessors. A good balancing scheme should e...
Pangfeng Liu, Jan-Jan Wu, Chih-Hsuae Yang
SOCIALCOM
2010
13 years 4 months ago
A Multi-factor Approach to Securing Software on Client Computing Platforms
Protecting the integrity of software platforms, especially in unmanaged consumer computing systems is a difficult problem. Attackers may attempt to execute buffer overflow attacks ...
Raghunathan Srinivasan, Vivek Iyer, Amit Kanitkar,...
CHI
2011
ACM
13 years 1 months ago
Does domain highlighting help people identify phishing sites?
Phishers are fraudsters that mimic legitimate websites to steal user’s credential information and exploit that information for identity theft and other criminal activities. Vari...
Eric Lin, Saul Greenberg, Eileah Trotter, David Ma...