93 results on '"Baiardi, F."'
Search Results
2. Assessing the Risk of an Information Infrastructure Through Security Dependencies
3. Two Layers Distributed Shared Memory
4. Load balancing and locality in hierarchical N-body algorithms on distributed memory architectures
5. Discovering How to Attack a System
6. A Tool for Parallel System Configuration and Program Mapping based on Genetic Algorithms
7. An architectural model for OR-parallellism on distributed memory systems
8. Parallel Implementation of a Multi-Layer Perceptron
9. Hierarchical, model-based risk management of critical infrastructures
10. Assessing the Risk of an Information Infrastructure Through Security Dependencies
11. MPI on a virtual shared memory
12. Massively parallel execution of logic programs: a static approach
13. DEBUGGING ENVIRONMNET
14. An architectural model for OR-parallellism on distributed memory systems
15. Parallelism issues in multi — Style computers
16. Strategies for a massively parallel implementation of simulated annealing
17. Metrics for Cyber Robustness
18. Using S-Rules to Fire Dynamic Countermeasures
19. An Extension of Haruspex to Cover Vulnerabilities in Application Environments
20. Assessing and Managing Risk by Simulating Attack Chains
21. Unbounded impacts and risk mitigation in billing infrastructures
22. Iterative Selection of Cost-Effective Countermeasures for Intelligent Threat Agents
23. Hierarchical Model Based Risk Management of Critical Infrastructures
24. Strategies for a massively parallel implementation of simulated annealing
25. Parallelism issues in multi — Style computers
26. Constrained Finite State Automata for Risk Analysis
27. Assessing the Risk of an Information Infrastructure through Security Dependencie
28. Constrained Automata: A formal tool for ICT risk assessment
29. Solving Irregular Problems through Parallel Irregular Trees
30. Two Layers Distributed Shared Memory
31. SEAS, an improvement of the Sensus protocol: design and implementation
32. SEAS: a Secure E-voting Applet System
33. Risk management of an information infrastructure: a framework based upon security dependencies
34. Improving Responsiveness By Locality In Distributed Virtual Environments
35. An Obfuscation-Based Approach against Injection Attacks.
36. PMH6 PHARMACOUTILIZATION OF ANTIDEPRESSANT DRUGS IN PRIMARY CARE: A LONG-TERM RETROSPECTIVE ANALYSIS OF A LARGE POPULATION
37. Securing a Community Cloud.
38. PsycoTrace: Virtual and Transparent Monitoring of a Process Self.
39. Semantics-Driven Introspection in a Virtual Environment.
40. Security and Integrity of a Distributed File Storage in a Virtual Environment.
41. Building Trustworthy Intrusion Detection through VM Introspection.
42. Short Paper: Policy Driven Virtual Machine Monitor for Protected Grids.
43. Assessing the Risk of an Information Infrastructure Through Security Dependencies.
44. DVSA and SHOE: support to shared data structures on distributed memory architectures.
45. Evaluation of a virtual shared memory machine by the compilation of data parallel loops.
46. Pisa parallel processing project on general-purpose highly-parallel computers.
47. A tool for the static optimization of concurrent programs.
48. Architectural models and design methodologies for general-purpose highly-parallel computers.
49. Development of a debugger for a concurrent language.
50. General purpose massively parallel systems: the role of programming environments.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.