Sciweavers

155 search results - page 21 / 31
» Detecting the performance impact of upgrades in large operat...
Sort
View
MANSCI
2007
107views more  MANSCI 2007»
13 years 7 months ago
Credit Risk in a Network Economy
We develop a structural model of credit risk in a network economy, where any firm can lend to any other firm, so that each firm is subject to counterparty risk either from dire...
Didier Cossin, Henry Schellhorn
LCN
2005
IEEE
14 years 1 months ago
A Novel Tuneable Low-Intensity Adversarial Attack
— Currently, Denial of Service (DoS) attacks remain amongst the most critical threats to Internet applications. The goal of the attacker in a DoS attack is to overwhelm a shared ...
Salil S. Kanhere, Anjum Naveed
NSDI
2004
13 years 9 months ago
Path-Based Failure and Evolution Management
We present a new approach to managing failures and evolution in large, complex distributed systems using runtime paths. We use the paths that requests follow as e through the syst...
Mike Y. Chen, Anthony Accardi, Emre Kiciman, David...
IMC
2005
ACM
14 years 1 months ago
Network Anomography
Anomaly detection is a first and important step needed to respond to unexpected problems and to assure high performance and security in IP networks. We introduce a framework and ...
Yin Zhang, Zihui Ge, Albert G. Greenberg, Matthew ...
INFOCOM
2006
IEEE
14 years 1 months ago
Reverse Hashing for High-Speed Network Monitoring: Algorithms, Evaluation, and Applications
— A key function for network traffic monitoring and analysis is the ability to perform aggregate queries over multiple data streams. Change detection is an important primitive w...
Robert T. Schweller, Zhichun Li, Yan Chen, Yan Gao...