Sciweavers

6199 search results - page 24 / 1240
» Monitoring the
Sort
View
ESIAT
2009
IEEE
13 years 7 months ago
On User Data Protocol of SMS in Remote Monitoring System
This paper looks into the features of SMS (short message service) relevant to building a remote monitoring system. Based on the analysis of SMS, a set of guidelines for customizing...
Yu Zhen, Sun Qiuwei
SIGMETRICS
2010
ACM
206views Hardware» more  SIGMETRICS 2010»
14 years 2 months ago
Successive c-optimal designs: a scalable technique to optimize the measurements on large networks
We propose a new approach to optimize the deployment and the sampling rates of network monitoring tools, such as Netflow, on a large IP network. It reduces to solving a stochasti...
Guillaume Sagnol, Mustapha Bouhtou, Stephane Gaube...
GI
2009
Springer
14 years 2 months ago
True Lies: Lazy Contracts for Lazy Languages
Abstract: Contracts are a proven tool in software development. They provide specifications for operations that may be statically verified or dynamically validated by contract mon...
Markus Degen, Peter Thiemann, Stefan Wehr
ATVA
2008
Springer
89views Hardware» more  ATVA 2008»
14 years 1 days ago
Impartial Anticipation in Runtime-Verification
In this paper, a uniform approach for synthesizing monitors checking correctness properties specified in linear-time logics at runtime is provided. Therefore, a generic three-value...
Wei Dong, Martin Leucker, Christian Schallhart
ECBS
2005
IEEE
108views Hardware» more  ECBS 2005»
14 years 8 hour ago
Interceptor Based Constraint Violation Detection
Monitoring critical events such as constraints violations is one of the key issues of Autonomic Systems. This paper presents an interceptor based approach of constraint violation ...
Qianxiang Wang, Aditya P. Mathur