Sciweavers

1090 search results - page 172 / 218
» A Replicated Monitoring Tool
Sort
View
ACSAC
2008
IEEE
14 years 3 months ago
Automatic Inference and Enforcement of Kernel Data Structure Invariants
Kernel-level rootkits affect system security by modifying key kernel data structures to achieve a variety of malicious goals. While early rootkits modified control data structur...
Arati Baliga, Vinod Ganapathy, Liviu Iftode
CDC
2008
IEEE
198views Control Systems» more  CDC 2008»
14 years 3 months ago
Performance analysis of different routing protocols in Wireless Sensor Networks for real-time estimation
— In this paper we analyze the performance of two different routing protocols specifically designed for Wireless Sensor Networks (WSNs) for real-time estimation, control, and mo...
Damiano Varagnolo, Phoebus Chen, Luca Schenato, Sh...
ACISICIS
2007
IEEE
14 years 3 months ago
A Framework to Detect Deviations During Process Enactment
People enacting processes deviate from the process definition for a variety of different reasons, the consequences of which may be either positive or negative. Detecting deviation...
Sean Thompson, Torab Torabi, Purva Joshi
HICSS
2007
IEEE
187views Biometrics» more  HICSS 2007»
14 years 3 months ago
A Service-Oriented Data Integration and Analysis Environment for In Silico Experiments and Bioinformatics Research
In this paper, we present a practical experiment of building a service-oriented system upon current web services technologies and bioinformatics middleware. The system allows scie...
Xiaorong Xiang, Gregory R. Madey, Jeanne Romero-Se...
ICEIS
2007
IEEE
14 years 3 months ago
Challenges in Business Process Analysis
Business process analysis ranges from model verification at design-time to the monitoring of processes at run-time. Much progress has been achieved in process verification. Today...
Wil M. P. van der Aalst