Sciweavers

1291 search results - page 108 / 259
» Intrusion Detection for Distributed Applications
Sort
View
HPCA
2011
IEEE
13 years 1 months ago
Dynamic parallelization of JavaScript applications using an ultra-lightweight speculation mechanism
As the web becomes the platform of choice for execution of more complex applications, a growing portion of computation is handed off by developers to the client side to reduce net...
Mojtaba Mehrara, Po-Chun Hsu, Mehrzad Samadi, Scot...
MIDDLEWARE
2005
Springer
14 years 3 months ago
I-RMI: Performance Isolation in Information Flow Applications
A problem with many distributed applications is their behavior in lieu of unpredictable variations in user request volumes or in available resources. This paper explores a performa...
Mohamed S. Mansour, Karsten Schwan
SRDS
1997
IEEE
14 years 2 months ago
Software Approach to Hazard Detection Using On-line Analysis of Safety Constraints
Hazard situations in safety-critical systems are typically complex, so there is a need for means to detect complex hazards and react in a timely and meaningful way. This paper add...
Beth A. Schroeder, Karsten Schwan, Sudhir Aggarwal
TPDS
2008
130views more  TPDS 2008»
13 years 10 months ago
Detecting VoIP Floods Using the Hellinger Distance
Voice over IP (VoIP), also known as Internet telephony, is gaining market share rapidly and now competes favorably as one of the visible applications of the Internet. Nevertheless,...
Hemant Sengar, Haining Wang, Duminda Wijesekera, S...
SKG
2006
IEEE
14 years 4 months ago
Security Attack Ontology for Web Services
Web services (WS) have become a significant part of the Web because of such attractive features as simple to use, platform independence, and XML/SOAP support. However, these featu...
Artem Vorobiev, Jun Han