Sciweavers

2986 search results - page 502 / 598
» Utilizing Heterogeneous Networks in Distributed Parallel Com...
Sort
View
164
Voted
HOTI
2005
IEEE
15 years 10 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood
EUROPAR
2003
Springer
15 years 9 months ago
Modeling Context-Aware Behavior by Interpreted ECA Rules
The software architecture of distributed systems is about to change due to new requirements of modern mobile devices. New network techniques, like ad-hoc radio communication or pee...
Wolfgang Beer, Volker Christian, Alois Ferscha, La...
IPPS
2006
IEEE
15 years 10 months ago
Web server protection by customized instruction set encoding
We present a novel technique to secure the execution of a processor against the execution of malicious code (trojans, viruses). The main idea is to permute parts of the opcode val...
Bernhard Fechner, Jörg Keller, Andreas Wohlfe...
FTDCS
2003
IEEE
15 years 9 months ago
Dynamic Component Composition for Functionality Adaptation in Pervasive Environments
With the increasing prevalence of mobile devices, computing is being carried out on devices with varied resource constraints and is afflicted by constant changes in run-time conte...
Nalini Moti Belaramani, Cho-Li Wang, Francis C. M....
IPPS
2007
IEEE
15 years 10 months ago
A Pretty Flexible API for Generic Peer-to-Peer Programming
NEBLO is a library and runtime system based on a structured overlay network. The API presented by NEBLO offers simple primitives and powerful mechanisms for programming generic p...
Giuseppe Ciaccio