Sciweavers

1090 search results - page 101 / 218
» A Replicated Monitoring Tool
Sort
View
RE
2005
Springer
14 years 3 months ago
The Role of Deferred Requirements in a Longitudinal Study of Emailing
Our group has taken a clinical approach to doing requirements engineering for a specific domain: delivering email tools to the cognitively impaired population. The clinical view s...
Stephen Fickas, William N. Robinson, McKay Moore S...
ACSAC
2004
IEEE
14 years 1 months ago
Reasoning About Complementary Intrusion Evidence
This paper presents techniques to integrate and reason about complementary intrusion evidence such as alerts generated by intrusion detection systems (IDSs) and reports by system ...
Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeve...
LISA
2008
14 years 12 days ago
Topnet: A Network-aware top(1)
System administrators regularly use the top utility for understanding the resource consumption of the processes running on UNIX computers. Top provides an accurate and real-time d...
Antonis Theocharides, Demetres Antoniades, Michali...
ICPADS
2010
IEEE
13 years 8 months ago
Effective Performance Measurement at Petascale Using IPM
As supercomputers are being built from an ever increasing number of processing elements, the effort required to achieve a substantial fraction of the system peak performance is con...
Karl Fürlinger, Nicholas J. Wright, David Ski...
DIMVA
2011
13 years 1 months ago
Operating System Interface Obfuscation and the Revealing of Hidden Operations
Many software security solutions—including malware analyzers, information flow tracking systems, auditing utilities, and host-based intrusion detectors—rely on knowledge of s...
Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giff...