Sciweavers

6689 search results - page 161 / 1338
» A Network Security Monitor
Sort
View
SRDS
2007
IEEE
14 years 4 months ago
Activity Monitoring to Guarantee File Availability in Structured P2P File-sharing Systems
A cooperative structured peer-to-peer file-sharing system requires that the nodes participating in the system need to maintain the location mappings of other nodes. However, the s...
Guowei Huang, Zhi Chen, Qi Zhao, Gongyi Wu
MCAM
2007
Springer
115views Multimedia» more  MCAM 2007»
14 years 4 months ago
Evolvement of DRM Schema: From Encryption to Interoperability and Monitoring
By reviewing DRMs up to now and two typical examples – AVS DRM and DMP IDP, the paper tries to find out the fundamental challenge of content protection approach from technical an...
Tiejun Huang
HOTOS
2009
IEEE
14 years 2 months ago
Computer Meteorology: Monitoring Compute Clouds
Cloud computing environments allow customers to execute arbitrary code on hardware owned by a cloud provider. While cloud providers use virtualization to ensure isolation between ...
Lionel Litty, H. Andrés Lagar-Cavilla, Davi...
FORTE
2004
13 years 11 months ago
A Temporal Logic Based Framework for Intrusion Detection
Abstract. We propose a framework for intrusion detection that is based on runtime monitoring of temporal logic specifications. We specify intrusion patterns as formulas in an expre...
Prasad Naldurg, Koushik Sen, Prasanna Thati
DSOM
2000
Springer
14 years 2 months ago
A Scalable Architecture for Monitoring and Visualizing Multicast Statistics
An understanding of certain network functions is critical for successful network management. Managers must have insight into network topology, protocol performance and fault detec...
Prashant Rajvaidya, Kevin C. Almeroth, Kimberly C....