Sciweavers

374 search results - page 62 / 75
» Lower-bounded facility location
Sort
View
DSN
2008
IEEE
14 years 2 months ago
On localization attacks to Internet Threat Monitors: An information-theoretic framework
Internet Threat Monitoring (ITM) systems are a widely deployed facility to detect, analyze, and characterize dangerous Internet threats such as worms and distributed denial-of-ser...
Wei Yu, Nan Zhang 0004, Xinwen Fu, Riccardo Bettat...
ISM
2006
IEEE
86views Multimedia» more  ISM 2006»
14 years 1 months ago
OreDesk: A Tool for Retrieving Data History Based on User Operations
During day-to-day activities, a user refers to various data items on a PC, such as documents, images, and audio clips. However, when the number of items in the history increases, ...
Ryo Ohsawa, Kazunori Takashio, Hideyuki Tokuda
PPOPP
2005
ACM
14 years 1 months ago
Trust but verify: monitoring remotely executing programs for progress and correctness
The increased popularity of grid systems and cycle sharing across organizations requires scalable systems that provide facilities to locate resources, to be fair in the use of tho...
Shuo Yang, Ali Raza Butt, Y. Charlie Hu, Samuel P....
SIGCSE
2005
ACM
156views Education» more  SIGCSE 2005»
14 years 1 months ago
Experiences teaching operating systems using virtual platforms and linux
Operating system courses teach students much more when they provide hands-on kernel-level project experience with a real operating system. However, enabling a large class of stude...
Jason Nieh, Chris Vaill
LCPC
2005
Springer
14 years 1 months ago
Lightweight Monitoring of the Progress of Remotely Executing Computations
Abstract. The increased popularity of grid systems and cycle sharing across organizations requires scalable systems that provide facilities to locate resources, to be fair in the u...
Shuo Yang, Ali Raza Butt, Y. Charlie Hu, Samuel P....