Sciweavers

2747 search results - page 41 / 550
» Network externalities in software systems
Sort
View
RAID
2001
Springer
14 years 1 months ago
Interfacing Trusted Applications with Intrusion Detection Systems
Abstract. In this paper we describe an interface between intrusion detection systems and trusted system components. The approach presented differs from conventional intrusion dete...
Marc G. Welz, Andrew Hutchison
OSDI
2008
ACM
14 years 9 months ago
Quanto: Tracking Energy in Networked Embedded Systems
We present Quanto, a network-wide time and energy profiler for embedded network devices. By combining well-defined interfaces for hardware power states, fast high-resolution energ...
Rodrigo Fonseca, Prabal Dutta, Philip Levis, Ion S...
ICDCSW
2006
IEEE
14 years 2 months ago
Handling Overload in Publish/Subscribe Systems
— This paper proposes a new approach for handling overload in Publish/Subscribe systems. We focus on the fact that every service has to cope with the limitations imposed by the e...
Zbigniew Jerzak, Christof Fetzer
HASE
1997
IEEE
14 years 1 months ago
ReSoFT: A Reusable Testbed for Development and Evaluation of Software Fault-Tolerant Systems
The Reusable Software Fault Tolerance Testbed ReSoFT was developed to facilitate the development and evaluation of high-assurance systems that require tolerance of both hardware...
Kam S. Tso, Eltefaat Shokri, Roger J. Dziegiel Jr.
ICMCS
2005
IEEE
75views Multimedia» more  ICMCS 2005»
14 years 2 months ago
Optimizing Prefetch in a Residential Gateway with Networked Storage Systems
VOD services require the storage system support with multiple disks. SCSI-based systems are usual choices. However, disks can be attached directly to networks these days. Fiber Ch...
Eunsam Kim, Jonathan C. L. Liu