Sciweavers

1090 search results - page 147 / 218
» A Replicated Monitoring Tool
Sort
View
ICCS
2009
Springer
14 years 3 months ago
A Holistic Approach for Performance Measurement and Analysis for Petascale Applications
Abstract. Contemporary high-end Terascale and Petascale systems are composed of hundreds of thousands of commodity multi-core processors interconnected with high-speed custom netwo...
Heike Jagode, Jack Dongarra, Sadaf R. Alam, Jeffre...
SP
2008
IEEE
133views Security Privacy» more  SP 2008»
14 years 3 months ago
ClearShot: Eavesdropping on Keyboard Input from Video
Eavesdropping on electronic communication is usually prevented by using cryptography-based mechanisms. However, these mechanisms do not prevent one from obtaining private informat...
Davide Balzarotti, Marco Cova, Giovanni Vigna
TOOLS
2008
IEEE
14 years 3 months ago
The Meta in Meta-object Architectures
Abstract. Behavioral reflection is crucial to support for example functional upgrades, on-the-fly debugging, or monitoring critical applications. However the use of reflective f...
Marcus Denker, Mathieu Suen, Stéphane Ducas...
GLOBECOM
2007
IEEE
14 years 3 months ago
Discovering Topologies at Router Level: Part II
—Measurement and monitoring of network topologies are essential tasks in current network scenarios. Indeed, due to their utility in planning, management, security, and reliabilit...
Alessio Botta, Walter de Donato, Antonio Pescap&eg...
ICECCS
2007
IEEE
144views Hardware» more  ICECCS 2007»
14 years 3 months ago
A Formal Semantic Model of the Semantic Web Service Ontology (WSMO)
Semantic Web Services, one of the most significant research areas within the Semantic Web vision, has attracted increasing attention from both the research community and industry...
Hai H. Wang, Nick Gibbins, Terry R. Payne, Ahmed S...