Sciweavers

1097 search results - page 20 / 220
» Sequential Object Monitors
Sort
View
IMC
2007
ACM
13 years 10 months ago
Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs
Rogue (unauthorized) wireless access points pose serious security threats to local networks. In this paper, we propose two online algorithms to detect rogue access points using se...
Wei Wei, Kyoungwon Suh, Bing Wang, Yu Gu, Jim Kuro...
ASPLOS
2011
ACM
13 years 2 days ago
ConSeq: detecting concurrency bugs through sequential errors
Concurrency bugs are caused by non-deterministic interleavings between shared memory accesses. Their effects propagate through data and control dependences until they cause softwa...
Wei Zhang, Junghee Lim, Ramya Olichandran, Joel Sc...
COLCOM
2009
IEEE
14 years 1 months ago
A decentralized mechanism for application level monitoring of distributed systems
Abstract—For a complex distributed system to be dependable, it must be continuously monitored, so that its failures and imperfections can be discovered and corrected in a timely ...
Constantin Serban, Wenxuan Zhang, Naftaly H. Minsk...
LISA
2001
13 years 9 months ago
Gossips: System and Service Monitor
Gossips is a modular client/server based system monitor. It uses distributed monitoring tasks to define and report states of an IT-environment. A monitoring task includes probes t...
Victor Götsch, Albert Wuersch, Tobias Oetiker
ECOOP
2009
Springer
14 years 9 months ago
Security Monitor Inlining for Multithreaded Java
Abstract. Program monitoring is a well-established and efficient approach to security policy enforcement. An implementation of program monitoring that is particularly appealing for...
Mads Dam, Bart Jacobs 0002, Andreas Lundblad, Fran...