Sciweavers

338 search results - page 20 / 68
» Operational Models for Reputation Servers
Sort
View
WETICE
2005
IEEE
14 years 1 months ago
Transparent Remote File Access in the Minimum Intrusion Grid
This paper describes the implementation of a thin user-level layer to be installed on Grid resources. The layer fits in the Minimum intrusion Grid design by imposing as few requi...
Rasmus Andersen, Brian Vinter
ACSAC
2003
IEEE
14 years 26 days ago
Experimenting with a Policy-Based HIDS Based on an Information Flow Control Model
In [1], we proposed a model for policy-based intrusion detection, based on information flow control. In the present paper, we show its applicability and effectiveness on a stand...
Jacob Zimmermann, Ludovic Mé, Christophe Bi...
ICDE
2006
IEEE
104views Database» more  ICDE 2006»
14 years 1 months ago
Trusted CVS
The CVS (Concurrent Versions System) software is a popular method for recording modifications to data objects, in addition to concurrent access to data in a multi-user environmen...
Muthuramakrishnan Venkitasubramaniam, Ashwin Macha...
ISSRE
2006
IEEE
14 years 1 months ago
Using Historical In-Process and Product Metrics for Early Estimation of Software Failures
The benefits that a software organization obtains from estimates of product quality are dependent upon how early in the product cycle that these estimates are available. Early est...
Nachiappan Nagappan, Thomas Ball, Brendan Murphy
DSOM
2005
Springer
14 years 1 months ago
Utilization and SLO-Based Control for Dynamic Sizing of Resource Partitions
This paper deals with a shared server environment where the server is divided into a number of resource partitions and used to host multiple applications at the same time. In a cas...
Zhikui Wang, Xiaoyun Zhu, Sharad Singhal