Sciweavers

233 search results - page 38 / 47
» The Evolution of System-Call Monitoring
Sort
View
CONCURRENCY
2010
75views more  CONCURRENCY 2010»
13 years 10 months ago
An Open Source performance tools software suite for scientific computing
With the rapid replacement of closed, homogeneous, proprietary HPC systems by heterogeneous, Linux-MPI cluster systems, the state of performance monitoring and analysis tools has ...
Philip J. Mucci, Tushar Mohan
JSW
2006
71views more  JSW 2006»
13 years 9 months ago
Semantics and Extensions of WS-Agreement
When having repeated interactions with a service provider, a service consumer might desire guarantees on the delivery of the service. These guarantees involve both functional and n...
Ganna Frankova, Daniela Malfatti, Marco Aiello
RE
2002
Springer
13 years 9 months ago
A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System
Requirements analysis for an Intrusion Detection System (IDS) involves deriving requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a collecti...
Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasan...
RE
2007
Springer
13 years 9 months ago
Using obstacle analysis to identify contingency requirements on an unpiloted aerial vehicle
This paper describes the use of Obstacle Analysis to identify anomaly handling requirements for a safety-critical, autonomous system. The software requirements for the system evolv...
Robyn R. Lutz, Ann Patterson-Hine, Stacy Nelson, C...
PPSN
2010
Springer
13 years 8 months ago
Topography-Aware Sensor Deployment Optimization with CMA-ES
Abstract. Wireless Sensor Networks (WSN) have been studied intensively for various applications such as monitoring and surveillance. Sensor deployment is an essential part of WSN, ...
Vahab Akbarzadeh, Albert Hung-Ren Ko, Christian Ga...