Sciweavers

935 search results - page 135 / 187
» Designing and implementing a family of intrusion detection s...
Sort
View
CLEIEJ
2006
126views more  CLEIEJ 2006»
13 years 10 months ago
Software Based Fault Tolerance against Byzantine Failures
The proposed software technique is a very low cost and an effective solution towards designing Byzantine fault tolerant computing application systems that are not so safety critic...
Goutam Kumar Saha
PLDI
2009
ACM
14 years 5 months ago
Binary analysis for measurement and attribution of program performance
Modern programs frequently employ sophisticated modular designs. As a result, performance problems cannot be identified from costs attributed to routines in isolation; understand...
Nathan R. Tallent, John M. Mellor-Crummey, Michael...
CODES
2008
IEEE
14 years 4 months ago
Symbolic voter placement for dependability-aware system synthesis
This paper presents a system synthesis approach for dependable embedded systems. The proposed approach significantly extends previous work by automatically inserting fault detect...
Felix Reimann, Michael Glabeta, Martin Lukasiewycz...
ASPLOS
2006
ACM
14 years 4 months ago
Geiger: monitoring the buffer cache in a virtual machine environment
Virtualization is increasingly being used to address server management and administration issues like flexible resource allocation, service isolation and workload migration. In a...
Stephen T. Jones, Andrea C. Arpaci-Dusseau, Remzi ...
ECIS
2001
13 years 11 months ago
Rethinking competence systems for innovative organizations
Information technology (IT) support for managing competence is based on a rationalistic view of competence. While these competence systems might work in rationalistic organization...
Rikard Lindgren, Dick Stenmark, Magnus Bergquist, ...