Sciweavers

1266 search results - page 12 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
DSN
2005
IEEE
14 years 29 days ago
A Performability-Oriented Software Rejuvenation Framework for Distributed Applications
While inherent resource redundancies in distributed applications facilitate gracefully degradable services, methods to enhance their dependability may have subtle, yet significan...
Ann T. Tai, Kam S. Tso, William H. Sanders, Savio ...
CORR
2010
Springer
151views Education» more  CORR 2010»
13 years 7 months ago
Behavioural Correlation for Detecting P2P Bots
In the past few years, IRC bots, malicious programs which are remotely controlled by the attacker through IRC servers, have become a major threat to the Internet and users. These ...
Yousof Al-Hammadi, Uwe Aickelin
PDPTA
2003
13 years 8 months ago
Flexible Approximate String Matching Application on a Heterogeneous Distributed Environment
In this paper, we present three parallel flexible approximate string matching methods on a parallel architecture with heterogeneous workstations to gain supercomputer power at lo...
Panagiotis D. Michailidis, Konstantinos G. Margari...
ADBIS
2001
Springer
114views Database» more  ADBIS 2001»
13 years 12 months ago
Evaluation of Join Strategies for Distributed Mediation
Three join algorithms are evaluated in an environment with distributed main-memory based mediators and data sources. A streamed ship-out join ships bulks of tuples to a mediator ne...
Vanja Josifovski, Timour Katchaounov, Tore Risch
SAFECOMP
2007
Springer
14 years 1 months ago
Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety
The general trend towards ubiquitous networking has reached the realm of airplanes. E-enabled airplanes with wired and wireless network interfaces offer a wide spectrum of network ...
Richard Robinson, Mingyan Li, Scott Lintelman, Kri...