Sciweavers

492 search results - page 76 / 99
» Exploring Recovery from Operating System Lockups
Sort
View
USENIX
2008
13 years 10 months ago
Cutting Corners: Workbench Automation for Server Benchmarking
A common approach to benchmarking a server is to measure its behavior under load from a workload generator. Often a set of such experiments is required-perhaps with different serv...
Piyush Shivam, Varun Marupadi, Jeffrey S. Chase, T...
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
14 years 2 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
IJNSEC
2007
125views more  IJNSEC 2007»
13 years 8 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
HICSS
2003
IEEE
125views Biometrics» more  HICSS 2003»
14 years 1 months ago
Impact of Technology Sustainability on Healthcare Governance
Healthcare technology investments must be borne by charity, government subsidy, or patient reimbursement. Such investments can be expensive and require partnerships of public and ...
Thomas Lee Rodgers, Evan E. Anderson, Ming Yuan, T...
SIGMOD
2000
ACM
159views Database» more  SIGMOD 2000»
14 years 10 days ago
DLFM: A Transactional Resource Manager
The DataLinks technology developed at IBM Almaden Research Center and now available in DB2 UDB 5.2 introduces a new data type called DATALINK for a database to reference and manag...
Hui-I Hsiao, Inderpal Narang