Sciweavers

3667 search results - page 630 / 734
» Software Rejuvenation - Modeling and Analysis
Sort
View
HICSS
2005
IEEE
157views Biometrics» more  HICSS 2005»
14 years 2 months ago
Integration Technology Adoption in Healthcare Organisations: A Case for Enterprise Application Integration
A continuous technological innovation in software has brought development in integration technologies that promise the real time enterprise-wide systems integration. Healthcare or...
Khalil Khoumbati, Marinos Themistocleous, Zahir Ir...
HICSS
2005
IEEE
173views Biometrics» more  HICSS 2005»
14 years 2 months ago
Implementing Rule-Based Monitors within a Framework for Continuous Requirements Monitoring
With the increasing complexity of information systems, it is becoming increasingly unclear as to how information system behaviors relate to stated requirements. Although requireme...
William N. Robinson
ISCA
2005
IEEE
135views Hardware» more  ISCA 2005»
14 years 2 months ago
Deconstructing Commodity Storage Clusters
The traditional approach for characterizing complex systems is to run standard workloads and measure the resulting performance as seen by the end user. However, unique opportuniti...
Haryadi S. Gunawi, Nitin Agrawal, Andrea C. Arpaci...
LCN
2005
IEEE
14 years 2 months ago
AntiWorm NPU-based Parallel Bloom Filters for TCP/IP Content Processing in Giga-Ethernet LAN
—TCP/IP protocol suite carries most application data in Internet. TCP flow retrieval has more security meanings than the IP packet payload. Hence, monitoring the TCP flow has mor...
Zhen Chen, Chuang Lin, Jia Ni, Dong-Hua Ruan, Bo Z...
ANCS
2005
ACM
14 years 2 months ago
High-throughput linked-pattern matching for intrusion detection systems
This paper presents a hardware architecture for highly efficient intrusion detection systems. In addition, a software tool for automatically generating the hardware is presented....
Zachary K. Baker, Viktor K. Prasanna