Sciweavers

1134 search results - page 206 / 227
» On Scalability and Modularisation in the Modelling of Networ...
Sort
View
EUROSYS
2006
ACM
14 years 4 months ago
Using queries for distributed monitoring and forensics
Distributed systems are hard to build, profile, debug, and test. Monitoring a distributed system – to detect and analyze bugs, test for regressions, identify fault-tolerance pr...
Atul Singh, Petros Maniatis, Timothy Roscoe, Peter...
SECURWARE
2008
IEEE
14 years 1 months ago
ToLeRating UR-STD
A new emerging paradigm of Uncertain Risk of Suspicion, Threat and Danger, observed across the field of information security, is described. Based on this paradigm a novel approac...
Jan Feyereisl, Uwe Aickelin
IPCCC
2006
IEEE
14 years 1 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau
KDD
2008
ACM
209views Data Mining» more  KDD 2008»
14 years 8 months ago
Combinational collaborative filtering for personalized community recommendation
Rapid growth in the amount of data available on social networking sites has made information retrieval increasingly challenging for users. In this paper, we propose a collaborativ...
WenYen Chen, Dong Zhang, Edward Y. Chang
FORTE
2000
13 years 8 months ago
Systematic Performance Evaluation of Multipoint Protocols
The adventof multipoint(multicast-based) applications and the growth and complexity of the Internet has complicated network protocol design and evaluation. In this paper, we prese...
Ahmed Helmy, Sandeep K. S. Gupta, Deborah Estrin, ...