Sciweavers

2715 search results - page 411 / 543
» Network bucket testing
Sort
View
WMTE
2002
IEEE
14 years 2 months ago
Environmental Detectives: PDAs as a Window into a Virtual Simulated World
The use of computer simulations is changing the nature of scientific investigation and providing us unique insights into the way that the world works. As simulation moves from the...
Eric Klopfer, Kurt Squire, Henry Jenkins
RAID
2001
Springer
14 years 1 months ago
Accurately Detecting Source Code of Attacks That Increase Privilege
Host-based Intrusion Detection Systems (IDS) that rely on audit data exhibit a delay between attack execution and attack detection. A knowledgeable attacker can use this delay to d...
Robert K. Cunningham, Craig S. Stevenson
DSN
2000
IEEE
14 years 1 months ago
Whither Generic Recovery from Application Faults? A Fault Study using Open-Source Software
This paper tests the hypothesis that generic recovery techniques, such as process pairs, can survive most application faults without using application-specific information. We ex...
Subhachandra Chandra, Peter M. Chen
DSN
2000
IEEE
14 years 1 months ago
Benchmarking Anomaly-Based Detection Systems
Anomaly detection is a key element of intrusiondetection and other detection systems in which perturbations of normal behavior suggest the presence of intentionally or unintention...
Roy A. Maxion, Kymie M. C. Tan
ICDCS
1999
IEEE
14 years 1 months ago
Fault Tolerant Video on Demand Services
This paper describes a highly available distributedvideo on demand (VoD) service which is inherently fault tolerant. The VoD service is provided by multiple servers that reside at...
Tal Anker, Danny Dolev, Idit Keidar