Sciweavers

1471 search results - page 8 / 295
» Derivation of Backup Service Management Applications from Se...
Sort
View
NOMS
2008
IEEE
123views Communications» more  NOMS 2008»
14 years 1 months ago
Model-based management of security services in complex network environments
Abstract—The security mechanisms employed in current networked environments are increasingly complex, and their configuration management has an important role for the protection...
João Porto de Albuquerque, Heiko Krumm, Pau...
NPC
2005
Springer
14 years 1 months ago
TCP-ABC: From Multiple TCP Connections to Atomic Broadcasting
In this paper, we proposed a novel scheme, named as TCP-ABC, which replicates the server side TCP connections among multiple server nodes of a cluster. By guaranteeing atomic reque...
Zhiyuan Shao, Hai Jin, Wenbin Jiang, Bin Cheng
NDSS
2009
IEEE
14 years 2 months ago
The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties
We introduce a new paradigm for outsourcing the durability property of a multi-client transactional database to an untrusted service provider. Specifically, we enable untrusted s...
Peter Williams, Radu Sion, Dennis Shasha
CAISE
2005
Springer
14 years 1 months ago
Service-Oriented Architectures and Mobile Services
Service-Oriented architectures and Service-Oriented Computing are the most recent approaches aiming at facilitating the design and development of applications on distributed system...
Ivar Jørstad, Schahram Dustdar, Do Van Than...
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
14 years 8 months ago
Eigenspace-based anomaly detection in computer systems
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
Hisashi Kashima, Tsuyoshi Idé