Sciweavers

2045 search results - page 353 / 409
» The open network laboratory
Sort
View
DEBS
2010
ACM
13 years 10 months ago
Complex event processing synergies with predictive analytics
For Complex Event Processing (CEP), the synergy with Predictive Analytics (PA) is a promising research direction. In this paper we focus on the inclusion of PA technologies into C...
Gabriella Toth, Lajos Jeno Fülöp, L&aacu...
FAST
2010
13 years 10 months ago
Panache: A Parallel File System Cache for Global File Access
Cloud computing promises large-scale and seamless access to vast quantities of data across the globe. Applications will demand the reliability, consistency, and performance of a t...
Marc Eshel, Roger L. Haskin, Dean Hildebrand, Mano...
USS
2008
13 years 10 months ago
FLAME: A Flow-Level Anomaly Modeling Engine
There are several remaining open questions in the area of flow-based anomaly detection, e.g., how to do meaningful evaluations of anomaly detection mechanisms; how to get conclusi...
Daniela Brauckhoff, Arno Wagner, Martin May
IEEESCC
2010
IEEE
13 years 9 months ago
An Assessment of Middleware Platforms for Accessing Remote Services
Due to the shift from software-as-a-product (SaaP) to software-as-a-service (SaaS), software components that were developed to run in a single address space must increasingly be a...
Young-Woo Kwon, Eli Tilevich, William R. Cook
CCS
2008
ACM
13 years 9 months ago
BootJacker: compromising computers using forced restarts
BootJacker is a proof-of-concept attack tool which demonstrates that authentication mechanisms employed by an operating system can be bypassed by obtaining physical access and sim...
Ellick Chan, Jeffrey C. Carlyle, Francis M. David,...