Sciweavers

119 search results - page 22 / 24
» From Cluster Monitoring to Grid Monitoring Based on GRM
Sort
View
IWCMC
2006
ACM
13 years 11 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu
MINENET
2005
ACM
13 years 10 months ago
A first step toward understanding inter-domain routing dynamics
BGP updates are triggered by a variety of events such as link failures, resets, routers crashing, configuration changes, and so on. Making sense of these updates and identifying ...
Kuai Xu, Jaideep Chandrashekar, Zhi-Li Zhang
ANOR
2010
135views more  ANOR 2010»
13 years 5 months ago
A framework of irregularity enlightenment for data pre-processing in data mining
Abstract Irregularities are widespread in large databases and often lead to erroneous conclusions with respect to data mining and statistical analysis. For example, considerable bi...
Siu-Tong Au, Rong Duan, Siamak G. Hesar, Wei Jiang
JCP
2006
106views more  JCP 2006»
13 years 5 months ago
Using Firewalls to Enforce Enterprise-wide Policies over Standard Client-Server Interactions
We propose and evaluate a novel framework for enforcing global coordination and control policies over message passing software components in enterprise computing environments. This...
Tuan Phan, Zhijun He, Thu D. Nguyen
JSA
2007
100views more  JSA 2007»
13 years 5 months ago
Resource consumption-aware QoS in cluster-based VOD servers
For Video-On-Demand (VOD) systems, it is important to provide Quality of Service (QoS) to more clients under limited resources. In this paper, the performance scalability in clust...
Dongmahn Seo, Joahyoung Lee, Yoon Kim, Changyeol C...