Sciweavers

1229 search results - page 40 / 246
» Live updating operating systems using virtualization
Sort
View
EUROMICRO
2004
IEEE
14 years 1 months ago
Intrusion Detection in Virtual Machine Environments
A virtual machine is a software replica of an underlying real machine. Multiple virtual machines can operate on the same host machine concurrently, without interfere each other. S...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
JCS
1998
338views more  JCS 1998»
13 years 9 months ago
Intrusion Detection Using Sequences of System Calls
A method is introducted for detecting intrusions at the level of privileged processes. Evidence is given that short sequences of system calls executed by running processes are a g...
Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaj...
ICAC
2006
IEEE
14 years 3 months ago
The Laundromat Model for Autonomic Cluster Computing
Traditional High Performance Computing systems require extensive management and suffer from security and configuration problems. This paper presents a new clustermanagement syste...
Jacob Gorm Hansen, Eske Christiansen, Eric Jul
SIGOPSE
1994
ACM
14 years 1 months ago
Using Active Messages to Support Shared Objects
This paper discusses a reliable group communication system using active messages to update shared objects. We discuss the model, implementation techniques, and our preliminary per...
Leendert van Doorn, Andrew S. Tanenbaum
ICTAI
2010
IEEE
13 years 7 months ago
Metropolis Particle Swarm Optimization Algorithm with Mutation Operator for Global Optimization Problems
When a local optimal solution is reached with classical Particle Swarm Optimization (PSO), all particles in the swarm gather around it, and escaping from this local optima becomes...
Lhassane Idoumghar, M. Idrissi-Aouad, Mahmoud Melk...