Sciweavers

60 search results - page 10 / 12
» Monitoring and control in scenario-based requirements analys...
Sort
View
ISSRE
2006
IEEE
14 years 1 months ago
Memoized Forward Computation of Dynamic Slices
Forward computation of dynamic slices is necessary to support interactive debugging and online analysis of long running programs. However, the overhead of existing forward computi...
Wes Masri, Nagi Nahas, Andy Podgurski
COMCOM
2004
149views more  COMCOM 2004»
13 years 7 months ago
Accelerating network security services with fast packet classification
To protect a network, secure network systems such as intrusion detection system (IDS) and firewall are often installed to control or monitor network traffic. These systems often i...
Shiuh-Pyng Shieh, Fu-Yuan Lee, Ya-Wen Lin
IFIP
2005
Springer
14 years 29 days ago
Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback
Nearly all network applications rely on the global Internet routing infrastructure to compute routes and deliver packets. Unfortunately, false Internet routes can be maliciously in...
Eunjong Kim, Daniel Massey, Indrajit Ray
TIM
2010
168views Education» more  TIM 2010»
13 years 2 months ago
Thermal Event Recognition Applied to Protection of Tokamak Plasma-Facing Components
Magnetic confinement fusion tokamaks are complex devices where a large amount of power is required to make the fusion reactions happen. In such experimental conditions, Plasma Faci...
Vincent Martin, Jean-Marcel Travere, Franço...
PAM
2005
Springer
14 years 29 days ago
Applying Principles of Active Available Bandwidth Algorithms to Passive TCP Traces
Abstract. While several algorithms have been created to actively measure the end-to-end available bandwidth of a network path, they require instrumentation at both ends of the path...
Marcia Zangrilli, Bruce Lowekamp