Sciweavers

1356 search results - page 4 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
EDCC
2008
Springer
13 years 7 months ago
SONDe, a Self-Organizing Object Deployment Algorithm in Large-Scale Dynamic Systems
We present the design, correctness, and analysis of SONDe, a simple fully decentralized object deployment algorithm for highly requested systems. Given an object (service or data)...
Vincent Gramoli, Anne-Marie Kermarrec, Erwan Le Me...
CONEXT
2009
ACM
13 years 6 months ago
BUFFALO: bloom filter forwarding architecture for large organizations
In enterprise and data center networks, the scalability of the data plane becomes increasingly challenging as forwarding tables and link speeds grow. Simply building switches with...
Minlan Yu, Alex Fabrikant, Jennifer Rexford
CSFW
2008
IEEE
14 years 7 days ago
Security Decision-Making among Interdependent Organizations
In various settings, such as when customers use the same passwords at several independent web sites, security decisions by one organization may have a significant impact on the s...
Reiko Ann Miura-Ko, Benjamin Yolken, John Mitchell...
SC
2009
ACM
14 years 17 days ago
Lessons learned from a year's worth of benchmarks of large data clouds
In this paper, we discuss some of the lessons that we have learned working with the Hadoop and Sector/Sphere systems. Both of these systems are cloud-based systems designed to sup...
Yunhong Gu, Robert L. Grossman
IEEEARES
2006
IEEE
13 years 11 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti