Sciweavers

5234 search results - page 100 / 1047
» Simulation of Computer Network Attacks
Sort
View
DSN
2007
IEEE
14 years 3 months ago
Protecting Cryptographic Keys from Memory Disclosure Attacks
Cryptography has become an indispensable mechanism for securing systems, communications and applications. While offering strong protection, cryptography makes the assumption that ...
Keith Harrison, Shouhuai Xu
CPHYSICS
2010
88views more  CPHYSICS 2010»
13 years 9 months ago
Distributed computing as a virtual supercomputer: Tools to run and manage large-scale BOINC simulations
Distributed computing (DC) projects tackle large computational problems by exploiting the donated processing power of thousands of volunteered computers, connected through the Int...
Toni Giorgino, Matt J. Harvey, Gianni De Fabritiis
WSC
2008
13 years 11 months ago
Integrated human decision making model under Belief-Desire-Intention framework for crowd simulation
An integrated Belief-Desire-Intention (BDI) modeling framework is proposed for human decision making and planning, whose sub-modules are based on Bayesian belief network (BBN), De...
Seungho Lee, Young-Jun Son
ICDCS
2006
IEEE
14 years 3 months ago
Robust Accounting in Decentralized P2P Storage Systems
A peer-to-peer (P2P) storage system allows a network of peer computers to increase the availability of their data by replicating it on other peers in the network. In such networks...
Ivan Osipkov, Peng Wang, Nicholas Hopper
NSDI
2008
13 years 11 months ago
Nysiad: Practical Protocol Transformation to Tolerate Byzantine Failures
The paper presents and evaluates Nysiad,1 a system that implements a new technique for transforming a scalable distributed system or network protocol tolerant only of crash failur...
Chi Ho, Robbert van Renesse, Mark Bickford, Danny ...