Sciweavers

807 search results - page 44 / 162
» Deploying and evaluating a location-aware system
Sort
View
TIME
2005
IEEE
14 years 3 months ago
LOLA: Runtime Monitoring of Synchronous Systems
Abstract— We present a specification language and algorithms for the online and offline monitoring of synchronous systems including circuits and embedded systems. Such monitori...
Ben D'Angelo, Sriram Sankaranarayanan, Césa...
IWIA
2005
IEEE
14 years 3 months ago
Stellar: A Fusion System for Scenario Construction and Security Risk Assessment
Stellar aggregates and correlates alerts from heterogeneous network defense systems, building scenarios and estimating the security risk of the entire scenario. Prior work conside...
Stephen Boyer, Oliver Dain, Robert Cunningham
RAID
2000
Springer
14 years 1 months ago
A Real-Time Intrusion Detection System Based on Learning Program Behavior
Abstract. In practice, most computer intrusions begin by misusing programs in clever ways to obtain unauthorized higher levels of privilege. One e ective way to detect intrusive ac...
Anup K. Ghosh, Christoph C. Michael, Michael Schat...
CHI
2008
ACM
14 years 10 months ago
LiveRAC: interactive visual exploration of system management time-series data
We present LiveRAC, a visualization system that supports the analysis of large collections of system management timeseries data consisting of hundreds of parameters across thousan...
Peter McLachlan, Tamara Munzner, Eleftherios Kouts...
FLOPS
2006
Springer
14 years 1 months ago
Soutei, a Logic-Based Trust-Management System
We describe the design and implementation of a trust-management system Soutei, a dialect of Binder, for access control in distributed systems. Soutei policies and credentials are w...
Andrew Pimlott, Oleg Kiselyov