Sciweavers

1090 search results - page 59 / 218
» A Replicated Monitoring Tool
Sort
View
VALUETOOLS
2006
ACM
141views Hardware» more  VALUETOOLS 2006»
14 years 1 months ago
A realistic simulation of internet-scale events
Internet-scale security incidents are becoming increasingly common, and the researchers need tools to replicate and study them in a controlled setting. Current network simulators,...
Songjie Wei, Jelena Mirkovic
DATE
2009
IEEE
92views Hardware» more  DATE 2009»
14 years 2 months ago
Using randomization to cope with circuit uncertainty
—Future computing systems will feature many cores that run fast, but might show more faults compared to existing CMOS technologies. New software methodologies must be adopted to ...
Hamid Safizadeh, Mohammad Tahghighi, Ehsan K. Arde...
IWPC
2007
IEEE
14 years 1 months ago
Designing your Next Empirical Study on Program Comprehension
The field of program comprehension is characterized by both the continuing development of new tools and techniques and the adaptation of existing techniques to address program co...
Massimiliano Di Penta, R. E. Kurt Stirewalt, Eilee...
USS
2004
13 years 9 months ago
Privtrans: Automatically Partitioning Programs for Privilege Separation
Privilege separation partitions a single program into two parts: a privileged program called the monitor and an unprivileged program called the slave. All trust and privileges are...
David Brumley, Dawn Xiaodong Song
ICDIM
2010
IEEE
13 years 5 months ago
Visualizing e-Government portal and its performance in WEBVS
An e-Government portal is responsible to provide news, information and services to citizens, merchants and tourists in a reliable way. Previously, we proposed a Web Monitoring Sys...
Ho Si Meng, Simon Fong