Sciweavers

1291 search results - page 185 / 259
» Intrusion Detection for Distributed Applications
Sort
View
MIDDLEWARE
2010
Springer
13 years 7 months ago
dFault: Fault Localization in Large-Scale Peer-to-Peer Systems
Distributed hash tables (DHTs) have been adopted as a building block for large-scale distributed systems. The upshot of this success is that their robust operation is even more imp...
Pawan Prakash, Ramana Rao Kompella, Venugopalan Ra...
WOMPAT
2004
Springer
14 years 2 months ago
Runtime Adjustment of Parallel Nested Loops
OpenMP allows programmers to specify nested parallelism in parallel applications. In the case of scientific applications, parallel loops are the most important source of paralleli...
Alejandro Duran, Raúl Silvera, Julita Corba...
DEBS
2007
ACM
14 years 21 days ago
A system for semantic data fusion in sensor networks
Emerging sensor network technologies are expected to substantially augment applications such as environmental monitoring, health-care, and home/commercial automation. However, muc...
Alex Wun, Milenko Petrovic, Hans-Arno Jacobsen
DEBS
2007
ACM
13 years 10 months ago
Identification of suspicious, unknown event patterns in an event cloud
This paper describes an approach to detect unknown event patterns. In this context, an event is not only something that happens, but also something that can be analysed. This task...
Alexander Widder, Rainer von Ammon, Philippe Schae...
SENSYS
2010
ACM
13 years 6 months ago
AutoWitness: locating and tracking stolen property while tolerating GPS and radio outages
We present AutoWitness, a system to deter, detect, and track personal property theft, improve historically dismal stolen property recovery rates, and disrupt stolen property distr...
Santanu Guha, Kurt Plarre, Daniel Lissner, Somnath...