Sciweavers

452 search results - page 83 / 91
» Diagnosability Analysis of Distributed Discrete Event System...
Sort
View
RTCSA
2000
IEEE
14 years 1 months ago
Task attribute assignment of fixed priority scheduled tasks to reenact off-line schedules
A number of industrial applications advocate the use of time-triggered approaches for reasons of predictability, distribution, and particular constraints such as jitter or end-to-...
Radu Dobrin, Yusuf Özdemir, Gerhard Fohler
SIGMOD
2010
ACM
277views Database» more  SIGMOD 2010»
14 years 1 months ago
A comparison of join algorithms for log processing in MaPreduce
The MapReduce framework is increasingly being used to analyze large volumes of data. One important type of data analysis done with MapReduce is log processing, in which a click-st...
Spyros Blanas, Jignesh M. Patel, Vuk Ercegovac, Ju...
ICDCS
2007
IEEE
14 years 20 days ago
Understanding Instant Messaging Traffic Characteristics
Instant messaging (IM) has become increasingly popular due to its quick response time, its ease of use, and possibility of multitasking. It is estimated that there are several mil...
Zhen Xiao, Lei Guo, John M. Tracey
ISSTA
2009
ACM
14 years 3 months ago
AVA: automated interpretation of dynamically detected anomalies
Dynamic analysis techniques have been extensively adopted to discover causes of observed failures. In particular, anomaly detection techniques can infer behavioral models from obs...
Anton Babenko, Leonardo Mariani, Fabrizio Pastore
NSPW
2004
ACM
14 years 2 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman