Sciweavers

1090 search results - page 200 / 218
» A Replicated Monitoring Tool
Sort
View
KDD
2009
ACM
188views Data Mining» more  KDD 2009»
14 years 3 months ago
BGP-lens: patterns and anomalies in internet routing updates
The Border Gateway Protocol (BGP) is one of the fundamental computer communication protocols. Monitoring and mining BGP update messages can directly reveal the health and stabilit...
B. Aditya Prakash, Nicholas Valler, David Andersen...
ETELEMED
2009
IEEE
171views Healthcare» more  ETELEMED 2009»
14 years 3 months ago
Drivers and Challenges of Wireless Solutions in Future Healthcare
What do IT oriented healthcare people think to be most attractive and credible wireless applications in healthcare? What do they think about the challenges? These questions were p...
Esko Alasaarela, Ravi Nemana, Steven DeMello
IROS
2009
IEEE
185views Robotics» more  IROS 2009»
14 years 3 months ago
Scalable and convergent multi-robot passive and active sensing
ā€” A major barrier preventing the wide employment of mobile networks of robots in tasks such as exploration, mapping, surveillance, and environmental monitoring is the lack of efļ...
Elias B. Kosmatopoulos, Lefteris Doitsidis, Konsta...
SACMAT
2009
ACM
14 years 3 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger
NDSS
2008
IEEE
14 years 3 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level speciļ¬cations for network protocols. Such speciļ¬cations are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...