Sciweavers

2943 search results - page 583 / 589
» Software Implementation of Synchronous Programs
Sort
View
KIVS
1999
Springer
13 years 11 months ago
Mobile Agents as an Architectural Concept for Internet-Based Distributed Applications - The WASP Project Approach
Abstract. After introducing the concept of mobile agents and potential application domains, we motivate why mobile agent technology is an interesting concept for large Internet-bas...
Stefan Fünfrocken, Friedemann Mattern
ICCAD
1997
IEEE
112views Hardware» more  ICCAD 1997»
13 years 11 months ago
Circuit optimization via adjoint Lagrangians
The circuit tuning problem is best approached by means of gradient-based nonlinear optimization algorithms. For large circuits, gradient computation can be the bottleneck in the o...
Andrew R. Conn, Ruud A. Haring, Chandramouli Viswe...
VLDB
1994
ACM
121views Database» more  VLDB 1994»
13 years 11 months ago
An Overview of Repository Technology
A repository is a shareddatabaseof information aboutengineeredartifacts.Wedefinea repository manager to be a databaseapplication that suPports checkout/checkin, version and config...
Philip A. Bernstein, Umeshwar Dayal
ICDCS
1990
IEEE
13 years 11 months ago
A Constructive Approach to the Design of Distributed Systems
The underlying model of distributed systems is that of loosely coupled components r running in parallel and communicating by message passing. Description, construction and evoluti...
Jeff Kramer, Jeff Magee, Anthony Finkelstein
CCS
2007
ACM
13 years 11 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...