Sciweavers

4004 search results - page 668 / 801
» Selecting an Approach to Designing Group Support Systems
Sort
View
SAC
2004
ACM
15 years 9 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
ATAL
2003
Springer
15 years 9 months ago
A Modular Paradigm for Building Self-Organizing Peer-to-Peer Applications
Peer-to-peer (P2P) technology has undergone rapid growth, producing new protocols and applications, many of which enjoy considerable commercial success and academic interest. Yet, ...
Márk Jelasity, Alberto Montresor, Özal...
ICSE
2001
IEEE-ACM
15 years 8 months ago
Engineering Mobile-Agent Applications via Context-Dependent Coordination
: The design and development of Internet applications, requiring dynamic and possibly mobile access to Internet resources, can take advantage of an approach based on autonomous mob...
Giacomo Cabri, Letizia Leonardi, Franco Zambonelli
TCOS
2010
14 years 11 months ago
PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware
Abstract. In [24] Raddum and Semaev propose a technique to solve systems of polynomial equations over F2 as occurring in algebraic attacks on block ciphers. This approach is known ...
Willi Geiselmann, Kenneth Matheis, Rainer Steinwan...
ICS
2009
Tsinghua U.
15 years 11 months ago
/scratch as a cache: rethinking HPC center scratch storage
To sustain emerging data-intensive scientific applications, High Performance Computing (HPC) centers invest a notable fraction of their operating budget on a specialized fast sto...
Henry M. Monti, Ali Raza Butt, Sudharshan S. Vazhk...