Sciweavers

1988 search results - page 334 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
OOPSLA
2010
Springer
13 years 7 months ago
G-Finder: routing programming questions closer to the experts
Programming forums are becoming the primary tools for programmers to find answers for their programming problems. Our empirical study of popular programming forums shows that the...
Wei Li, Charles Zhang, Songlin Hu
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
14 years 3 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...
ICDCS
2008
IEEE
14 years 3 months ago
MC2: Multiple Clients on a Multilevel Cache
In today’s networked storage environment, it is common to have a hierarchy of caches where the lower levels of the hierarchy are accessed by multiple clients. This sharing can h...
Gala Yadgar, Michael Factor, Kai Li, Assaf Schuste...
IPPS
2007
IEEE
14 years 3 months ago
Software Tools for Performance Modeling of Parallel Programs
This paper presents a framework based on a user driven methodology to obtain analytical models of MPI applications on parallel systems in a systematic and easy to use way. This me...
Diego Rodriguez Martínez, Vicente Blanco P&...
COORDINATION
2007
Springer
14 years 3 months ago
Fact Spaces: Coordination in the Face of Disconnection
Coordination languages for ad hoc networks with a fluid topology do not offer adequate support to detect and deal with device disconnection. Such a disconnection is particularly ...
Stijn Mostinckx, Christophe Scholliers, Eline Phil...