What do our computer systems do all day? How do we make sure they continue doing it when failures occur? Traditional approaches to answering these questions often involve inband m...
Dan Pelleg, Muli Ben-Yehuda, Richard Harper, Lisa ...
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
This paper develops a context aware framework to address the diverse communication needs of a modern enterprise. Such enterprises are characterized by workers in different locatio...
Munmun De Choudhury, Hari Sundaram, Ajita John, Do...
Abstract. Alcatel-Lucent is a major player in the eld of telecommunications. One of the products it oers to network operators is wireless infrastructure such as base stations. Su...
Roman van der Krogt, James Little, Kenneth Pulliam...
The required real-time and high-rate transfers for multimedia data severely limit the number of requests that can be serviced concurrently by Video-on-Demand (VOD) servers. Resour...