Sciweavers

631 search results - page 81 / 127
» Gossips: System and Service Monitor
Sort
View
RAID
2007
Springer
14 years 3 months ago
Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems
We present a novel approach to remote traffic aggregation for Network Intrusion Detection Systems (NIDS) called Cooperative Selective Wormholing (CSW). Our approach works by select...
John R. Lange, Peter A. Dinda, Fabián E. Bu...
WETICE
2005
IEEE
14 years 3 months ago
Data access optimization on grid systems
— The execution of data intensive grid applications still raises several questions regarding job scheduling, data migration and replication. The optimization techniques applied b...
László Csaba Lorincz, Tamás K...
AINA
2004
IEEE
14 years 1 months ago
Authenticated Autonomous System Traceback
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet making the defense against Distributed Denial of Service attacks one of the ha...
Vamsi Paruchuri, Arjan Durresi, Rajgopal Kannan, S...
OSDI
2002
ACM
14 years 10 months ago
Scale and Performance in the Denali Isolation Kernel
This paper describes the Denali isolation kernel, an operating system architecture that safely multiplexes a large number of untrusted Internet services on shared hardware. Denali...
Andrew Whitaker, Marianne Shaw, Steven D. Gribble
ECEH
2006
162views Healthcare» more  ECEH 2006»
13 years 11 months ago
Mobile Health Care: Towards a Commercialization of Research Results
: During the last fours years a consortium of universities, hospitals and commercial companies has been working together for the development of innovative systems and services for ...
Dimitri Konstantas, Richard Bults, Aart van Halter...