Sciweavers

155 search results - page 10 / 31
» Tolerating Intrusions in Grid Systems
Sort
View
P2P
2006
IEEE
119views Communications» more  P2P 2006»
14 years 1 months ago
Defense against Intrusion in a Live Streaming Multicast System
Application-level multicast systems are vulnerable to attacks that impede nodes from receiving desired data. Live streaming protocols are especially susceptible to packet loss ind...
Maya Haridasan, Robbert van Renesse
ISORC
2007
IEEE
14 years 1 months ago
Exploiting Tuple Spaces to Provide Fault-Tolerant Scheduling on Computational Grids
Scheduling tasks on large-scale computational grids is difficult due to the heterogeneous computational capabilities of the resources, node unavailability and unreliable network ...
Fábio Favarim, Joni da Silva Fraga, Lau Che...
CCGRID
2008
IEEE
14 years 2 months ago
An Autonomic Workflow Management System for Global Grids
Workflow Management System is generally utilized to define, manage and execute workflow applications on Grid resources. However, the increasing scale complexity, heterogeneity and...
Mustafizur Rahman 0003, Rajkumar Buyya
TSMC
2002
134views more  TSMC 2002»
13 years 7 months ago
Incorporating soft computing techniques into a probabilistic intrusion detection system
There are a lot of industrial applications that can be solved competitively by hard computing, while still requiring the tolerance for imprecision and uncertainty that can be explo...
Sung-Bae Cho
ICETE
2004
204views Business» more  ICETE 2004»
13 years 9 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson