Sciweavers

1448 search results - page 77 / 290
» Deadlock Detection in Distributed Systems
Sort
View
ICCS
2007
Springer
14 years 4 months ago
DDDAS/ITR: A Data Mining and Exploration Middleware for Grid and Distributed Computing
We describe our project that marries data mining together with Grid computing. Specifically, we focus on one data mining application - the Minnesota Intrusion Detection System (MIN...
Jon B. Weissman, Vipin Kumar, Varun Chandola, Eric...
COMPSAC
2006
IEEE
14 years 4 months ago
On the Distribution of Property Violations in Formal Models: An Initial Study
Model-checking techniques are successfully used in the verification of both hardware and software systems of industrial relevance. Unfortunately, the capability of current techni...
Jimin Gao, Mats Per Erik Heimdahl, David Owen, Tim...
NSDI
2007
14 years 18 days ago
Ensuring Content Integrity for Untrusted Peer-to-Peer Content Distribution Networks
Many existing peer-to-peer content distribution networks (CDNs) such as Na Kika, CoralCDN, and CoDeeN are deployed on PlanetLab, a relatively trusted environment. But scaling them...
Nikolaos Michalakis, Robert Soulé, Robert G...
IPPS
2002
IEEE
14 years 3 months ago
Improving the Performance of Distributed CORBA Applications
This paper proposes a new technique called CORBAas-needed to improve the performance of distributed CORBA applications. CORBA-as-needed allows distributed CORBA applications to ...
Shivakant Mishra, Nija Shi
CW
2003
IEEE
14 years 3 months ago
Utilizing Statistical Characteristics of N-grams for Intrusion Detection
Information and infrastructure security is a serious issue of global concern. As the last line of defense for security infrastructure, intrusion detection techniques are paid more...
Zhuowei Li, Amitabha Das, Sukumar Nandi