Sciweavers

4965 search results - page 872 / 993
» Measuring the Performance of Real-Time Systems
Sort
View
CCS
2004
ACM
15 years 9 months ago
Operational experiences with high-volume network intrusion detection
In large-scale environments, network intrusion detection systems (NIDSs) face extreme challenges with respect to traffic volume, traffic diversity, and resource management. Whil...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
ESORICS
2004
Springer
15 years 9 months ago
Parameterized Authentication
We describe an approach to sensor-based authentication that can adapt to accommodate incomplete, unreliable, or inaccurate input provided to the system. Parameterized Authenticatio...
Michael J. Covington, Mustaque Ahamad, Irfan A. Es...
IWMM
2004
Springer
82views Hardware» more  IWMM 2004»
15 years 9 months ago
Write barrier elision for concurrent garbage collectors
Concurrent garbage collectors require write barriers to preserve consistency, but these barriers impose significant direct and indirect costs. While there has been a lot of work ...
Martin T. Vechev, David F. Bacon
SAC
2010
ACM
15 years 9 months ago
Chemical-inspired self-composition of competing services
This paper aims at pushing the clear relationship between software service composition and chemical dynamics a step forward. We developed a coordination model where services and c...
Mirko Viroli, Matteo Casadei
DISCEX
2003
IEEE
15 years 9 months ago
The STRONGMAN Architecture
The design principle of restricting local autonomy only where necessary for global robustness has led to a scalable Internet. Unfortunately, this scalability and capacity for dist...
Angelos D. Keromytis, Sotiris Ioannidis, Michael B...