Sciweavers

129 search results - page 19 / 26
» User- and job-centric monitoring: Analysing and presenting l...
Sort
View
DIMVA
2011
12 years 11 months ago
An Assessment of Overt Malicious Activity Manifest in Residential Networks
While conventional wisdom holds that residential users experience a high degree of compromise and infection, this presumption has seen little validation in the way of an in-depth s...
Gregor Maier, Anja Feldmann, Vern Paxson, Robin So...
SIGSOFT
2005
ACM
14 years 8 months ago
Applying classification techniques to remotely-collected program execution data
There is an increasing interest in techniques that support measurement and analysis of fielded software systems. One of the main goals of these techniques is to better understand ...
Murali Haran, Alan F. Karr, Alessandro Orso, Adam ...
ASC
2007
14 years 6 months ago
A BDI Agent System for Credit Risk Assessment based on Fuzzy Logic
Credit risk has always been an important issue for banks and other financial intermediaries. A reliable and consistent computing system is necessary to simplify the decision mak...
S. Bonura, V. Morreale, G. Cammarata, F. Cantore,...
POLICY
2004
Springer
14 years 1 months ago
DecisionQoS: An Adaptive, Self-Evolving QoS Arbitration Module for Storage Systems
As a consequence of the current trend towards consolidating computing, storage and networking infrastructures into large centralized data centers, applications compete for shared ...
Sandeep Uttamchandani, Guillermo A. Alvarez, Gul A...
ICDCS
2007
IEEE
13 years 11 months ago
Communication-Efficient Tracking of Distributed Cumulative Triggers
In recent work, we proposed D-Trigger, a framework for tracking a global condition over a large network that allows us to detect anomalies while only collecting a very limited amo...
Ling Huang, Minos N. Garofalakis, Anthony D. Josep...