Sciweavers

1448 search results - page 38 / 290
» Deadlock Detection in Distributed Systems
Sort
View
130
Voted
EDOC
2004
IEEE
15 years 6 months ago
Notations for the Specification and Verification of Composite Web Services
Availability of a wide variety of Web services over the Internet offers opportunities of providing new value added services built by composing them out of existing ones. Service c...
Simon J. Woodman, Doug J. Palmer, Santosh K. Shriv...
106
Voted
COMCOM
2008
80views more  COMCOM 2008»
15 years 2 months ago
Transforming general networks into feed-forward by using turn-prohibition
The issue of breaking cycles in communication networks is an important topic for several reasons. For instance, it is required when transparent bridges are filling the forwarding ...
Juan Echagüe, Jesús E. Villadangos, Vi...
318
Voted
NOMS
2010
IEEE
251views Communications» more  NOMS 2010»
15 years 1 months ago
Online detection of utility cloud anomalies using metric distributions
—The online detection of anomalies is a vital element of operations in data centers and in utility clouds like Amazon EC2. Given ever-increasing data center sizes coupled with th...
Chengwei Wang, Vanish Talwar, Karsten Schwan, Part...
126
Voted
EUROPAR
2006
Springer
15 years 6 months ago
Supporting a Real-Time Distributed Intrusion Detection Application on GATES
Increasingly, a number of applications across computer sciences and other science and engineering disciplines rely on, or can potentially benefit from, analysis and monitoring of d...
Qian Zhu, Liang Chen, Gagan Agrawal
106
Voted
CN
1999
115views more  CN 1999»
15 years 2 months ago
A large scale distributed intrusion detection framework based on attack strategy analysis
To appropriately address the problem of large-scale distributed intrusion assessment/detection, issues such as information exchange, work division and coordination amongst various...
Ming-Yuh Huang, Robert J. Jasper, Thomas M. Wicks