Sciweavers

290 search results - page 25 / 58
» New NFS Tracing Tools and Techniques for System Analysis
Sort
View
ICSE
2009
IEEE-ACM
14 years 8 months ago
Analyzing critical process models through behavior model synthesis
Process models capture tasks performed by agents together with their control flow. Building and analyzing such models is important but difficult in certain areas such as safety-cr...
Christophe Damas, Bernard Lambeau, Francois Roucou...
CCGRID
2009
IEEE
14 years 2 months ago
Towards Visualization Scalability through Time Intervals and Hierarchical Organization of Monitoring Data
Highly distributed systems such as Grids are used today to the execution of large-scale parallel applications. The behavior analysis of these applications is not trivial. The comp...
Lucas Mello Schnorr, Guillaume Huard, Philippe Oli...
WCRE
2008
IEEE
14 years 2 months ago
The Metric Lens: Visualizing Metrics and Structure on Software Diagrams
We present the metric lens, a new visualization of methodlevel code metrics atop UML class diagrams, which allows performing metric-metric and metric-structure correlations on lar...
Heorhiy Byelas, Alexandru Telea
NDSS
2008
IEEE
14 years 2 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
ASPLOS
2006
ACM
14 years 1 months ago
Temporal search: detecting hidden malware timebombs with virtual machines
Worms, viruses, and other malware can be ticking bombs counting down to a specific time, when they might, for example, delete files or download new instructions from a public we...
Jedidiah R. Crandall, Gary Wassermann, Daniela A. ...