Sciweavers

109 search results - page 16 / 22
» Predicting the resource consumption of network intrusion det...
Sort
View
USENIX
2008
13 years 10 months ago
Context-Aware Prefetching at the Storage Server
In many of today's applications, access to storage constitutes the major cost of processing a user request. Data prefetching has been used to alleviate the storage access lat...
Gokul Soundararajan, Madalin Mihailescu, Cristiana...
EUROSYS
2007
ACM
14 years 4 months ago
Latency and bandwidth-minimizing failure detectors
Failure detectors are fundamental building blocks in distributed systems. Multi-node failure detectors, where the detector is tasked with monitoring N other nodes, play a critical...
Kelvin C. W. So, Emin Gün Sirer
CORR
2010
Springer
91views Education» more  CORR 2010»
13 years 7 months ago
Verifiable Network-Performance Measurements
In the current Internet, there is no clean way for affected parties to react to poor forwarding performance: to detect and assess Service Level Agreement (SLA) violations by a con...
Katerina J. Argyraki, Petros Maniatis, Ankit Singl...
ANCS
2009
ACM
13 years 5 months ago
SPC-FA: synergic parallel compact finite automaton to accelerate multi-string matching with low memory
Deterministic Finite Automaton (DFA) is well-known for its constant matching speed in worst case, and widely used in multistring matching, which is a critical technique in high pe...
Junchen Jiang, Yi Tang, Bin Liu, Xiaofei Wang, Yan...
RAID
1999
Springer
13 years 11 months ago
Audit logs: to keep or not to keep?
We approached this line of inquiry by questioning the conventional wisdom that audit logs are too large to be analyzed and must be reduced and filtered before the data can be anal...
Christopher Wee