Sciweavers

34 search results - page 7 / 7
» Intrusion Detection in Virtual Machine Environments
Sort
View
IPPS
2009
IEEE
13 years 11 months ago
Input-independent, scalable and fast string matching on the Cray XMT
String searching is at the core of many security and network applications like search engines, intrusion detection systems, virus scanners and spam filters. The growing size of o...
Oreste Villa, Daniel G. Chavarría-Miranda, ...
ENTCS
2006
104views more  ENTCS 2006»
13 years 5 months ago
Using Bytecode Instruction Counting as Portable CPU Consumption Metric
Accounting for the CPU consumption of applications is crucial for software development to detect and remove performance bottlenecks (profiling) and to evaluate the performance of ...
Walter Binder, Jarle Hulaas
SIGOPS
2008
145views more  SIGOPS 2008»
13 years 4 months ago
Towards distributed storage resource management using flow control
Deployment of shared storage systems is increasing with rapid adoption of virtualization technologies to provide isolation, better management and high utilization of resources. Qu...
Ajay Gulati, Irfan Ahmad
SEAA
2008
IEEE
13 years 11 months ago
Service Coroner: A Diagnostic Tool for Locating OSGi Stale References
The OSGi Services Platform provides a framework for the dynamic deployment of Java-based applications. It allows to install, to activate, to update and to uninstall application mo...
Kiev Gama, Didier Donsez