Sciweavers

673 search results - page 89 / 135
» Request behavior variations
Sort
View
AWCC
2004
Springer
14 years 1 months ago
Real-Time Emulation of Intrusion Victim in HoneyFarm
Security becomes increasingly important. However, existing security tools, almost all defensive, have many vulnerabilities which are hard to overcome because of the lack of informa...
Xing-Yun He, Kwok-Yan Lam, Siu Leung Chung, Chi-Hu...
CODES
2003
IEEE
14 years 28 days ago
Schedule-aware performance estimation of communication architecture for efficient design space exploration
In this paper, we are concerned about the performance estimation of bus-based architectures assuming that the task partitioning on the processing components is already determined....
Sungchan Kim, Chaeseok Im, Soonhoi Ha
IEEEAMS
2003
IEEE
14 years 27 days ago
JAGR: An Autonomous Self-Recovering Application Server
This paper demonstrates that the dependability of generic, evolving J2EE applications can be enhanced through a combination of a few recovery-oriented techniques. Our goal is to r...
George Candea, Emre Kiciman, Steve Zhang, Pedram K...
SIGECOM
2003
ACM
110views ECommerce» more  SIGECOM 2003»
14 years 26 days ago
Virtual worlds: fast and strategyproof auctions for dynamic resource allocation
We consider the problem of designing fast and strategyproof exchanges for dynamic resource allocation problems in distributed systems. The exchange is implemented as a sequence of...
Chaki Ng, David C. Parkes, Margo I. Seltzer
PRIMA
2009
Springer
14 years 5 days ago
Participatory Simulation Environment gumonji/Q: A Network Game Empowered by Agents
Abstract. Network games are attracting attention as simulation platforms for social experiments because of their rich visualization performance and scalability. Our objective in th...
Shohei Yamane, Shoichi Sawada, Hiromitsu Hattori, ...