Traditional performance analysis techniques are performed after a parallel program has completed. In this paper, we describe an online method for continuously monitoring the perfor...
Isaac Dooley, Chee Wai Lee, Laxmikant V. Kal&eacut...
Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...
Decentralized file-sharing systems like Napster [11] and Gnutella [23] have popularized the peer-to-peer approach [18,20,22], which emphasizes the use of distributed resources in ...
Critical network management applications increasingly demand fine-grained flow level measurements. However, current flow monitoring solutions are inadequate for many of these appl...
Vyas Sekar, Michael K. Reiter, Walter Willinger, H...
Abstract— This work presents an infrastructure that simplifies the development of distributed applications that can adapt automatically to nonfunctional properties of their comp...