Sciweavers

995 search results - page 27 / 199
» Intrusion ripple analysis in distributed information systems
Sort
View
ASPLOS
2006
ACM
14 years 1 months ago
ExecRecorder: VM-based full-system replay for attack analysis and system recovery
Log-based recovery and replay systems are important for system reliability, debugging and postmortem analysis/recovery of malware attacks. These systems must incur low space and p...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...
GIS
1999
ACM
13 years 11 months ago
Integrating Geographic Information Systems, Spatial Digital Libraries and Information Spaces for Conducting Humanitarian Assista
The GeoWorlds system integrates geographic information systems, spatial digital libraries and other information analysis, retrieval and collaboration tools. It supports multiple a...
Vished Kumar, Alejandro Bugacov, Murilo Coutinho, ...
IEEEARES
2009
IEEE
13 years 5 months ago
Quantitative Analysis of Secure Information Flow via Probabilistic Semantics
We present an automatic analyzer for measuring information flow within software systems. In this paper, we quantify leakage in terms of information theory and incorporate this comp...
Chunyan Mu, David Clark
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
14 years 2 months ago
Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
Abstract -- Detection of execution anomalies is very important for the maintenance, development, and performance refinement of large scale distributed systems. Execution anomalies ...
Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li
CHI
2003
ACM
14 years 7 months ago
Exploring the distribution of online healthcare information
Motivated by the importance of retrieving comprehensive healthcare information, we analyzed how information about 12 concepts related to a widely available healthcare topic is dis...
Suresh K. Bhavnani, Renju T. Jacob, Jennifer Nardi...