Sciweavers

1291 search results - page 141 / 259
» Intrusion Detection for Distributed Applications
Sort
View
PRDC
1999
IEEE
14 years 1 months ago
Cost of Ensuring Safety in Distributed Database Management Systems
Generally, applications employing Database Management Systems (DBMS) require that the integrity of the data stored in the database be preserved during normal operation as well as ...
Maitrayi Sabaratnam, Svein-Olaf Hvasshovd, Ø...
UM
2010
Springer
13 years 7 months ago
User Modeling for Telecommunication Applications: Experiences and Practical Implications
Abstract. Telecommunication applications based on user modeling focus on extracting customer behavior and preferences from the information implicitly included in Call Detail Record...
Heath Hohwald, Enrique Frías-Martíne...
ISSTA
2006
ACM
14 years 2 months ago
Application of automated environment generation to commercial software
Model checking can be an effective technique for detecting concurrency-related errors in software systems. However, due to scalability issues, to handle industrial-strength softw...
Oksana Tkachuk, Sreeranga P. Rajan
GRID
2004
Springer
14 years 2 months ago
Phoenix: Making Data-Intensive Grid Applications Fault-Tolerant
A major hurdle facing data intensive grid applications is the appropriate handling of failures that occur in the grid-environment. Implementing the fault-tolerance transparently a...
George Kola, Tevfik Kosar, Miron Livny
ICAC
2006
IEEE
14 years 2 months ago
Enabling Self-Managing Applications using Model-based Online Control Strategies
— The increasing heterogeneity, dynamism, and uncertainty of emerging DCE (Distributed Computing Environment) systems imply that an application must be able to detect and adapt t...
Viraj Bhat, Manish Parashar, Hua Liu, Mohit Khande...