Sciweavers

1430 search results - page 22 / 286
» A Performance Study of Monitoring and Information Services f...
Sort
View
ACSAC
1999
IEEE
14 years 27 days ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti
AOIS
2003
13 years 10 months ago
Trustworthy Service Caching: Cooperative Search in P2P Information Systems
We are developing an approach for P2P information systems, where the peers are modeled as autonomous agents. Agents provide services or give referrals to one another to help find...
Yathiraj B. Udupi, Pinar Yolum, Munindar P. Singh
HCW
1999
IEEE
14 years 27 days ago
Adaptive Distributed Applications on Heterogeneous Networks
Distributed applications execute in environments that can include different network architectures as well as a range of compute platforms. Furthermore, these resources are shared ...
Thomas R. Gross, Peter Steenkiste, Jaspal Subhlok
CLUSTER
2002
IEEE
13 years 8 months ago
PHOENIX: A Self Adaptable Monitoring Platform for Cluster Management
Distributed systems based on cluster of workstation are more and more difficult to manage due to the increasing number of processors involved, and the complexity of associated appl...
Céline Boutrous-Saab, Xavier Bonnaire, Bert...
CCE
2007
13 years 8 months ago
Performance monitoring of industrial controllers based on the predictability of controller behavior
This study focuses on performance assessment of industrial controllers. A methodology based on the concept of the predictability of controller errors is proposed for performance m...
Rachid A. Ghraizi, Ernesto Martínez, C&eacu...