Sciweavers

1291 search results - page 134 / 259
» Intrusion Detection for Distributed Applications
Sort
View
125
Voted
ICNP
2009
IEEE
15 years 9 months ago
Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks
—Wormhole attack is a severe threat to wireless ad hoc and sensor networks. Most existing countermeasures either require specialized hardware devices or make strong assumptions o...
Dezun Dong, Mo Li, Yunhao Liu, Xiang-Yang Li, Xian...
123
Voted
DCOSS
2009
Springer
15 years 9 months ago
Optimal Allocation of Time-Resources for Multihypothesis Activity-Level Detection
Abstract. The optimal allocation of samples for activity-level detection in a wireless body area network for health-monitoring applications is considered. A wireless body area netw...
Gautam Thatte, Viktor Rozgic, Ming Li, Sabyasachi ...
89
Voted
IPPS
2007
IEEE
15 years 8 months ago
Automatic Program Segment Similarity Detection in Targeted Program Performance Improvement
Targeted optimization of program segments can provide an additional program speedup over the highest default optimization level, such as -O3 in GCC. The key challenge is how to au...
Haiping Wu, Eunjung Park, Mihailo Kaplarevic, Ying...
125
Voted
OSDI
1996
ACM
15 years 3 months ago
Online Data-Race Detection via Coherency Guarantees
We present the design and evaluation of an on-thefly data-race-detection technique that handles applications written for the lazy release consistent (LRC) shared memory model. We ...
Dejan Perkovic, Peter J. Keleher
SAC
2006
ACM
15 years 2 months ago
A new method of generating synchronizable test sequences that detect output-shifting faults based on multiple UIO sequences
The objective of testing is to determine the conformance between a system and its specification. When testing distributed systems, the existence of multiple testers brings out the...
Kai Chen, Fan Jiang, Chuan-dong Huang