Sciweavers

4835 search results - page 910 / 967
» Holonic Simulation of a Design System for Performance Analys...
Sort
View
NSPW
2004
ACM
14 years 2 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
IMC
2003
ACM
14 years 2 months ago
Virtual landmarks for the internet
Internet coordinate schemes have been proposed as a method for estimating minimum round trip time between hosts without direct measurement. In such a scheme, each host is assigned...
Liying Tang, Mark Crovella
SIGDOC
2003
ACM
14 years 2 months ago
Beyond theory: making single-sourcing actually work
In this paper, I discuss how we made single-sourcing work at Juniper Networks. This is a practical discussion of issues, problems, and successes. Categories and Subject Descriptor...
Liz Fraley
HICSS
2002
IEEE
93views Biometrics» more  HICSS 2002»
14 years 1 months ago
A Combination Measurement for Studying Disorientation
The disorientation problem has been known to exist on hypertext and hypermedia systems. Various approaches have also been recommended and implemented in order to eliminate or redu...
Noor F. M. Yatim
INFOCOM
2002
IEEE
14 years 1 months ago
Clock Synchronization Algorithms for Network Measurements
Abstract—Packet delay traces are important measurements for analyzing end-to-end performance and for designing traffic control algorithms in computer networks. Due to the fact t...
Li Zhang, Zhen Liu, Cathy H. Xia