Sciweavers

3751 search results - page 732 / 751
» Events in security protocols
Sort
View
TASE
2010
IEEE
13 years 2 months ago
Analytic Calculus of Response Time in Networked Automation Systems
--This paper presents a novel approach to evaluate the response time in networked automation systems (NAS) that use a client/server protocol. The developments introduced are derive...
Boussad Addad, Said Amari, Jean-Jacques Lesage
KDD
2009
ACM
232views Data Mining» more  KDD 2009»
14 years 8 months ago
Classification of software behaviors for failure detection: a discriminative pattern mining approach
Software is a ubiquitous component of our daily life. We often depend on the correct working of software systems. Due to the difficulty and complexity of software systems, bugs an...
David Lo, Hong Cheng, Jiawei Han, Siau-Cheng Khoo,...
OSDI
2006
ACM
14 years 8 months ago
Flight Data Recorder: Monitoring Persistent-State Interactions to Improve Systems Management
Mismanagement of the persistent state of a system--all the executable files, configuration settings and other data that govern how a system functions--causes reliability problems,...
Chad Verbowski, Emre Kiciman, Arunvijay Kumar, Bra...
ASPLOS
2010
ACM
14 years 2 months ago
ParaLog: enabling and accelerating online parallel monitoring of multithreaded applications
Instruction-grain lifeguards monitor the events of a running application at the level of individual instructions in order to identify and help mitigate application bugs and securi...
Evangelos Vlachos, Michelle L. Goodstein, Michael ...
HICSS
2008
IEEE
102views Biometrics» more  HICSS 2008»
14 years 2 months ago
Retrofitting Cyber Physical Systems for Survivability through External Coordination
Most Supervisory Control and Data Acquisition (SCADA) systems have been in operation for decades and they in general have 24x7 availability requirement, hence upgrading or adding ...
Kun Xiao, Shangping Ren, Kevin A. Kwiat