Sciweavers

1291 search results - page 211 / 259
» Intrusion Detection for Distributed Applications
Sort
View
PPOPP
2005
ACM
14 years 2 months ago
Scaling model checking of dataraces using dynamic information
Dataraces in multithreaded programs often indicate severe bugs and can cause unexpected behaviors when different thread interleavings are executed. Because dataraces are a cause f...
Ohad Shacham, Mooly Sagiv, Assaf Schuster
HPCC
2009
Springer
14 years 1 months ago
A Compensation-Based Reliable Data Delivery for Instant Wireless Sensor Network
Instant wireless sensor network (IWSN) is a type of WSN deployed for a class of special applications which have the common requirement on instantly responding for collecting and t...
Yi-Ying Zhang, Xi Luo, Laurence Tianruo Yang, Lei ...
ICDCS
2000
IEEE
14 years 1 months ago
A Client-Server Oriented Algorithm for Virtually Synchronous Group Membership in WANs
We describe a novel scalable group membership algorithm designed for wide area networks WANs. Our membership service does not evolve from existing LAN-oriented membership servic...
Idit Keidar, Jeremy B. Sussman, Keith Marzullo, Da...
ICPP
1999
IEEE
14 years 1 months ago
Improving Performance of Load-Store Sequences for Transaction Processing Workloads on Multiprocessors
On-line transaction processing exhibits poor memory behavior in high-end multiprocessor servers because of complex sharing patterns and substantial interaction between the databas...
Jim Nilsson, Fredrik Dahlgren
ICDCS
2010
IEEE
14 years 18 days ago
Are Your Hosts Trading or Plotting? Telling P2P File-Sharing and Bots Apart
—Peer-to-peer (P2P) substrates are now widely used for both file-sharing and botnet command-andcontrol. Despite the commonality of their substrates, we show that the different g...
Ting-Fang Yen, Michael K. Reiter