Sciweavers

1291 search results - page 97 / 259
» Intrusion Detection for Distributed Applications
Sort
View
SAS
2007
Springer
126views Formal Methods» more  SAS 2007»
14 years 3 months ago
Hierarchical Pointer Analysis for Distributed Programs
We present a new pointer analysis for use in shared memory programs running on hierarchical parallel machines. The analysis is motivated by the partitioned global address space lan...
Amir Kamil, Katherine A. Yelick
GI
2009
Springer
13 years 7 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
CVPR
2010
IEEE
14 years 5 months ago
Spatialized Epitome and Its Applications
Due to the lack of explicit spatial consideration, existing epitome model may fail for image recognition and target detection, which directly motivates us to propose the so-calle...
Xinqi Chu, Shuicheng Yan, Liyuan Li, Kap Luk Chan,...
IMC
2003
ACM
14 years 2 months ago
Bitmap algorithms for counting active flows on high speed links
—This paper presents a family of bitmap algorithms that address the problem of counting the number of distinct header patterns (flows) seen on a high-speed link. Such counting c...
Cristian Estan, George Varghese, Mike Fisk
DSN
2003
IEEE
14 years 3 months ago
Node Failure Detection and Membership in CANELy
Fault-tolerant distributed systems based on fieldbuses may benefit to a great extent from the availabilityof semantically rich communication services,such as those provided by g...
José Rufino, Paulo Veríssimo, Guilhe...