Sciweavers

1098 search results - page 208 / 220
» Proactive Intrusion Detection
Sort
View
OSDI
2008
ACM
14 years 7 months ago
On the Impact of Disk Scrubbing on Energy Savings
The increasing use of computers for saving valuable data imposes stringent reliability constraints on storage systems. Reliability improvement via use of redundancy is a common pr...
Guanying Wang, Ali Raza Butt, Chris Gniady
ECBS
2005
IEEE
179views Hardware» more  ECBS 2005»
14 years 1 months ago
Prototype of Fault Adaptive Embedded Software for Large-Scale Real-Time Systems
This paper describes a comprehensive prototype of large-scale fault adaptive embedded software developed for the proposed Fermilab BTeV high energy physics experiment. Lightweight...
Derek Messie, Mina Jung, Jae C. Oh, Shweta Shetty,...
ICNP
2003
IEEE
14 years 20 days ago
RR-TCP: A Reordering-Robust TCP with DSACK
TCP performs poorly on paths that reorder packets significantly, where it misinterprets out-of-order delivery as packet loss. The sender responds with a fast retransmit though no...
Ming Zhang, Brad Karp, Sally Floyd, Larry L. Peter...
DAGSTUHL
2007
13 years 8 months ago
Integrated Human Behavior Modeling
In order to prevent emergencies or critical situations where humans are the origin, a timely provision of information thus obtained for the coordinating services and the on-site st...
Michael Berger, Dagmar Beyer, Stephan Prueckner
CMS
2006
13 years 8 months ago
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation
Abstract. Sophisticated worms that use precomputed hitlists of vulnerable targets are especially hard to contain, since they are harder to detect, and spread at rates where even au...
Spyros Antonatos, Kostas G. Anagnostakis