Sciweavers

66 search results - page 11 / 14
» Secure Remote Execution of Sequential Computations
Sort
View
EPEW
2008
Springer
13 years 9 months ago
Partial Evaluation of PEPA Models for Fluid-Flow Analysis
Abstract. We present an application of partial evaluation to performance models expressed in the PEPA stochastic process algebra [1]. We partially evaluate the state-space of a PEP...
Allan Clark, Adam Duguid, Stephen Gilmore, Mirco T...
PVM
2001
Springer
13 years 12 months ago
Parallel IO Support for Meta-computing Applications: MPI_Connect IO Applied to PACX-MPI
Parallel IO (PIO) support for larger scale computing is becoming more important as application developers better understand its importance in reducing overall execution time by avo...
Graham E. Fagg, Edgar Gabriel, Michael M. Resch, J...
CCS
2007
ACM
13 years 11 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
BIRTHDAY
2004
Springer
14 years 27 days ago
A Trace Semantics for Long-Running Transactions
Abstract. A long-running transaction is an interactive component of a distributed system which must be executed as if it were a single atomic action. In principle, it should not be...
Michael J. Butler, C. A. R. Hoare, Carla Ferreira
DSOM
2004
Springer
14 years 27 days ago
Autonomous Management of Clustered Server Systems Using JINI
Abstract. A framework for the autonomous management of clustered server systems called LAMA1 (Large-scale system’s Autonomous Management Agent) is proposed in this paper. LAMA is...
Chul Lee, Seung Ho Lim, Sang Seok Lim, Kyu Ho Park