Sciweavers

364 search results - page 2 / 73
» Monitoring, Analyzing, and Controlling Internet-scale System...
Sort
View
CCS
2007
ACM
13 years 11 months ago
Specifying and analyzing security automata using CSP-OZ
Security automata are a variant of B¨uchi automata used to specify security policies that can be enforced by monitoring system execution. In this paper, we propose using CSP-OZ, ...
David A. Basin, Ernst-Rüdiger Olderog, Paul E...
DMSN
2006
ACM
13 years 11 months ago
Intelligent system monitoring on large clusters
Modern data centers have a large number of components that must be monitored, including servers, switches/routers, and environmental control systems. This paper describes InteMon,...
Jimeng Sun, Evan Hoke, John D. Strunk, Gregory R. ...
SIGCOMM
2006
ACM
13 years 11 months ago
Analyzing the MAC-level behavior of wireless networks in the wild
We present Wit, a non-intrusive tool that builds on passive monitoring to analyze the detailed MAC-level behavior of operational wireless networks. Wit uses three processing steps...
Ratul Mahajan, Maya Rodrig, David Wetherall, John ...
CCS
2008
ACM
13 years 7 months ago
EON: modeling and analyzing dynamic access control systems with logic programs
We present EON, a logic-programming language and tool that can be used to model and analyze dynamic access control systems. Our language extends Datalog with some carefully design...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani...
ICESS
2004
Springer
13 years 10 months ago
Selecting a Scheduling Policy for Embedded Real-Time Monitor and Control Systems
An integrated solution to guarantee real-time requirements in embedded real-time monitor and control systems is presented in this paper. First l task model is abstracted from such ...
Qingxu Deng, Mingsong Lv, Ge Yu