Sciweavers

454 search results - page 63 / 91
» Making distributed systems secure with program analysis and ...
Sort
View
CCS
2005
ACM
14 years 2 months ago
Fast and automated generation of attack signatures: a basis for building self-protecting servers
Large-scale attacks, such as those launched by worms and zombie farms, pose a serious threat to our network-centric society. Existing approaches such as software patches are simpl...
Zhenkai Liang, R. Sekar
RTSS
2003
IEEE
14 years 1 months ago
Data Caches in Multitasking Hard Real-Time Systems
Data caches are essential in modern processors, bridging the widening gap between main memory and processor speeds. However, they yield very complex performance models, which make...
Xavier Vera, Björn Lisper, Jingling Xue
DEBS
2007
ACM
14 years 18 days ago
A QoS policy configuration modeling language for publish/subscribe middleware platforms
Publish/subscribe (pub/sub) middleware platforms for eventbased distributed systems often provide many configurable policies that affect end-to-end quality of service (QoS). Altho...
Joe Hoffert, Douglas C. Schmidt, Aniruddha S. Gokh...
AUSDM
2006
Springer
124views Data Mining» more  AUSDM 2006»
14 years 12 days ago
Analyzing Harmonic Monitoring Data Using Data Mining
Harmonic monitoring has become an important tool for harmonic management in distribution systems. A comprehensive harmonic monitoring program has been designed and implemented on ...
Ali Asheibi, David Stirling, Danny Soetanto
VEE
2005
ACM
199views Virtualization» more  VEE 2005»
14 years 2 months ago
Escape analysis in the context of dynamic compilation and deoptimization
In object-oriented programming languages, an object is said to escape the method or thread in which it was created if it can also be accessed by other methods or threads. Knowing ...
Thomas Kotzmann, Hanspeter Mössenböck