Sciweavers

569 search results - page 89 / 114
» Evaluating Cluster-based Network Servers
Sort
View
NDSS
2006
IEEE
14 years 3 months ago
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks
The custom, ad hoc nature of web applications makes learning-based anomaly detection systems a suitable approach to provide early warning about the exploitation of novel vulnerabi...
William K. Robertson, Giovanni Vigna, Christopher ...
ICMCS
2005
IEEE
105views Multimedia» more  ICMCS 2005»
14 years 3 months ago
Streaming layered encoded video using peers
Peer-to-peer video streaming has emerged as an important means to transport stored video. The peers are less costly and more scalable than an infrastructure-basedvideo streaming n...
Yanming Shen, Zhengye Liu, Shivendra S. Panwar, Ke...
DSN
2003
IEEE
14 years 3 months ago
Compiler-Directed Program-Fault Coverage for Highly Available Java Internet Services
Abstract: We present a new approach that uses compilerdirected fault-injection for coverage testing of recovery code in Internet services to evaluate their robustness to operating ...
Chen Fu, Richard P. Martin, Kiran Nagaraja, Thu D....
CCGRID
2002
IEEE
14 years 2 months ago
Tracing a Large-Scale Peer to Peer System: An Hour in the Life of Gnutella
Peer-to-peer computing and networking, an emerging model of communication and computation, has recently started to gain significant acceptance. This model not only enables client...
Evangelos P. Markatos
MOBISYS
2009
ACM
14 years 10 months ago
R2D2: regulating beam shape and rate as directionality meets diversity
We design, implement, and evaluate a vehicular communication system that improves uplink connectivity through multi-lobe beam pattern switching on a smart antenna. Directionality ...
Kishore Ramachandran, Ravi Kokku, Karthikeyan Sund...