favorite11Slave nodes, in turn, host a set of worker s (also called containers), in charge of running the map and reduce tasks of a MapReduce application, as well as using the local storage to maintain a subset of the HDFS data blocks.
favorite11In the realm of bioinformatics, this point is well illustrated in the Magellan Final Report  regarding the collection of k-mer statistics in large meta-genomic datasets: MPI solutions would work but it was much more convenient to use Hadoop and MapReduce, also considering the availability of higher level tools like Pig [26, 27].
favorite93. hardware [21, 22]; (b) Apache designed the Hadoop framework with the aim to devise a tool supporting the efficient processing of large datasets, exploiting cluster resources through data partitioning and the MapReduce paradigm.
favorite23We provide evidence that the usage of technologies such as Hadoop or Spark for the analysis of big datasets of biological sequences is productive only if the architectural details and the peculiar aspects of the considered framework are carefully taken into account for the algorithm design and implementation..
favorite8FastKmer is the introduction of a module for balancing the statistics aggregation workload over the nodes of a computing cluster, in order to overcome data skew while allowing for a fully exploitation of the underlying distributed architecture.
favorite1Moreover, in order to further confuse detection systems, the communication patterns to follow during the execution of the attack would not be established statically but decided at runtime, by evaluating a function that would decide which other web worker would be the target of a communication at the end of a certain step.
favorite7In Section 6 we present a prototype implementation for our techniques together with the results of an experimental analysis aimed at assessing their effectiveness when used in conjunction with several malware codes and malware detection systems.
favorite19In this work, we show how to use some of the functionalities introduced with the upcoming HTML5 standard to rethink some of the obfuscation techniques used to deliver web malware on the browser of a victim machine.
favorite17In this article we present new obfuscation techniques, based on some of the features of the upcoming HTML5 standard, which can be used to deceive malware detection systems.